US20070190939A1 - Means for provisioning and managing mobile device configuration over a near-field communication link - Google Patents
Means for provisioning and managing mobile device configuration over a near-field communication link Download PDFInfo
- Publication number
- US20070190939A1 US20070190939A1 US11/354,508 US35450806A US2007190939A1 US 20070190939 A1 US20070190939 A1 US 20070190939A1 US 35450806 A US35450806 A US 35450806A US 2007190939 A1 US2007190939 A1 US 2007190939A1
- Authority
- US
- United States
- Prior art keywords
- provisioning
- server
- field communication
- nfc
- near field
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000004891 communication Methods 0.000 title claims abstract description 36
- 238000000034 method Methods 0.000 claims abstract description 19
- 230000005540 biological transmission Effects 0.000 claims description 8
- 230000001413 cellular effect Effects 0.000 claims description 3
- 239000000344 soap Substances 0.000 claims description 3
- 230000010267 cellular communication Effects 0.000 abstract description 4
- 230000007246 mechanism Effects 0.000 abstract description 3
- 238000007726 management method Methods 0.000 description 13
- 238000005516 engineering process Methods 0.000 description 7
- 230000008901 benefit Effects 0.000 description 6
- 238000012545 processing Methods 0.000 description 6
- 238000001514 detection method Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 239000003999 initiator Substances 0.000 description 4
- 238000004806 packaging method and process Methods 0.000 description 4
- 238000004519 manufacturing process Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 241000699666 Mus <mouse, genus> Species 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 238000001228 spectrum Methods 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 241000699670 Mus sp. Species 0.000 description 1
- 230000003213 activating effect Effects 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 229910052802 copper Inorganic materials 0.000 description 1
- 239000010949 copper Substances 0.000 description 1
- 230000009849 deactivation Effects 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 230000000116 mitigating effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Images
Classifications
-
- H04B5/48—
-
- H04B5/72—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/618—Details of network addresses
- H04L2101/622—Layer-2 addresses, e.g. medium access control [MAC] addresses
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Definitions
- Wireless networks and/or devices such as, but not limited to, wireless local area networks (WLAN), Bluetooth, local area network (LAN), sub-networks (e.g., wireless mouse and personal computer), portable digital assistants (PDA's), mice, keyboards, speakers, monitors, routers, phones, cellular communication devices, wireless devices, access points, hubs, . . . facilitate functionality with mitigation of wires and accompanied restrictions.
- WLAN wireless local area networks
- LAN local area network
- sub-networks e.g., wireless mouse and personal computer
- PDA's portable digital assistants
- mice keyboards, speakers, monitors, routers, phones, cellular communication devices, wireless devices, access points, hubs, . . .
- cellular communication devices wireless devices
- wireless devices and/or networks are advantageous to hard-wired networks and/or devices for numerous reasons.
- SMS Traditional Wireless Application Protocol
- SMS push Service Indication/Service Loading uses the GSM Short-Message Service. Since SMS requires prior identification of the device, it prevents unsolicited push of service indicators or service loading. Further, use of SMS as a push data bearer assumes a device with a GSM radio, active service account with phone number assigned, and access by the server to the SMS-C (SMS Center) gateway. SMS is also a measured-rate service to all but the subscriber's mobile operator.
- SMS-C SMS Center
- a device provisioning and/or configuration system and method employs a near field communication (NFC) channel in an active and/or passive mode as a channel for provisioning and/or managing mobile device(s) (e.g., with content and/or setting(s)) by a server.
- NFC near field communication
- the device can be any device that can employ a near field communication channel (e.g., phone, cellular communication device, portable digital assistant (PDA), handheld game console, media player . . . ).
- the system provides a mechanism for pushing device configuration and/or service indicator(s), for example, through a point-of-sale and/or point-of-service.
- the system utilizes NFC which facilitates selectivity to ensure that only the target device is configured.
- the NFC-capable device thus exposes its management interface(s) across the NFC channel.
- device(s) can be in factory-configured state without general connectivity (e.g., no WLAN or mobile data service yet).
- NFC technology permits wireless communication between devices across a narrow distance of 1 meter down to 2 centimeters or less.
- the air link and protocols are similar to those used by contactless smart cards and RFID, though there are differences in practice at multiple layers in the architecture.
- the server and the device can each include an antenna and a transceiver (including RF circuitry) (e.g., that comply with the ISO/IEC 18092:2004 standard).
- a transceiver including RF circuitry
- the server data can be read by the device.
- the device can act as a node while a server discovers and reads/transmits data to the server.
- the system employs the NFC channel as a device management and/or provisioning interface for mobile device(s).
- NFC has several notable advantages as a bearer of over-the-air provisioning and/or device management when compared to conventional system(s).
- NFC has selectivity ranging from one meter down to a couple of centimeters and does not require prior knowledge of a specific device address. Further, NFC does not require a line of sight (as IRDA does), in fact, NFC can work through clothing and/or retail packaging.
- device discovery and detection is through broadcast and response, but within short-range, unlike Bluetooth whose range is up to thirty feet.
- the NFC channel is local, thus, the device is not exposed to general Internet or intranet traffic.
- NFC employs an unlicensed frequency spectrum and thus is not burdened by access fees.
- NFC is suitable for (e.g., designed for) use in a production line environment. Accordingly, the fast association times and collision detection and avoidance features of NFC are ideal for in-factory configuration and customization of device(s).
- NFC channel is designed for ultra-low power operation and can remain passive until in the presence of a reader.
- NFC has local selectivity as it's range is limited to less than one meter.
- NFC uses a low-cost device antenna system that can be integrated (e.g., directly) into paper and plastic packaging.
- the NFC channel can be employed in active and/or passive mode as a channel for provisioning and/or managing mobile device(s).
- the server as initiator, generates an RF field which permits the NFC circuitry of the device to power itself from the RF field and to accept small amounts of data without main power applied (e.g., without a battery or other power source).
- the passive mode can be used, for example, to provision device(s) and/or extract device capability document(s) while power is not applied and/or a power source (e.g., batter) is removed.
- a power source e.g., batter
- the NFC channel can be employed to trigger a power-on or wake to permit dispatch of an NFC event that occurs while the device is in the “off” state.
- provisioning files can be received during the passive state and can be buffered.
- the buffer can be inspected and any valid and authorized content and/or setting(s) can be retrieved and applied to the device.
- this content and related settings can take the form of a URL which points to the content (e.g., either in the device's ROM, the device's file system and/or somewhere external to the device such as the Internet).
- the content and related settings can take the form of a data archive package (e.g., a CAB, ZIP and/or JAR file).
- Content over the NFC channel can be in a standardized format and/or in a proprietary format.
- the NFC circuitry appears to the embedded operating system as another communication channel on which layered protocols can be exposed through existing service elements in the device.
- NFC can be exposed as a physical network interface, a TCP/IP interface, OBEX endpoint, SOAP endpoint, SyncML client or server, FTP client or server, and/or other data communication protocol endpoint.
- the system can employ the NFC channel in the active and/or passive mode as a channel for provisioning the mobile device (e.g., with content and/or setting(s).
- the system can utilize the NFC channel, in combination with other standardized and/or proprietary service elements, to expose these communication endpoints through a “touch target” by simply aligning the device with another NFC-capable device (e.g., server) that supports compatible communication protocols. and/or managing device
- FIG. 1 is a block diagram of a device configuration system.
- FIG. 2 is a block diagram of a device configuration system.
- FIG. 3 is a block diagram of a device configuration system.
- FIG. 4 is a flow chart of a method of provisioning and/or managing device configuration.
- FIG. 5 is a flow chart of a method of provisioning and/or managing device configuration.
- FIG. 6 is a flow chart of a method of provisioning and/or managing device configuration.
- FIG. 7 illustrates an example operating environment.
- a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
- an application running on a server and the server can be a component.
- One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers. Also, these components can execute from various computer readable media having various data structures stored thereon.
- the components may communicate via local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as the Internet with other systems via the signal).
- Computer components can be stored, for example, on computer readable media including, but not limited to, an ASIC (application specific integrated circuit), CD (compact disc), DVD (digital video disk), ROM (read only memory), floppy disk, hard disk, EEPROM (electrically erasable programmable read only memory) and memory stick in accordance with the claimed subject matter.
- the system 100 employs a near field communication (NFC) channel 110 in an active and/or passive mode as a channel for provisioning and/or managing mobile device(s) 120 (e.g., with content and/or setting(s)).
- the device 120 can be any device that can employ a near field communication channel 110 (e.g., a computer, a network, wireless keyboard, speaker, mouse, monitor, headset, headphones, remote, router, access point, printer, hard drive, modem, microphone, phone, cellular communication device, portable digital assistant (PDA), handheld game console, media player . . . ).
- PDA portable digital assistant
- the device 120 can have other wireless data transmission capability(ies) (e.g., mobile cellular data, third generation ( 3 G), General Packet Radio Service (GPRS), Code-Division Multiple Access (CDMA), Wideband Code-Division Multiple Access (W-CDMA), wireless fidelity (Wi-Fi), IEEE 802.16 (WiMAX), 802.11, Bluetooth, Ultra Wide-Band, IrDA, etc.).
- the device 120 can have hard-wired data transmission capability(ies) including, for example, wired Ethernet, USB, IEEE 1394, FireWire, power line data transmission and/or other wired communication link.
- the device 120 can be a device designed specifically for storage and transmission of device provisioning setting(s) and/or content (e.g., token).
- the system 100 thus provides a mechanism for pushing device configuration and/or service indicator(s), for example, through a point-of-sale and/or point-of-service.
- the system 100 utilizes NFC which facilitates selectivity to ensure that only the target device 120 is configured.
- the NFC-capable device 120 thus exposes its management interface(s) across the NFC channel 110 .
- device(s) 120 can be in factory-configured state without general connectivity (e.g., no WLAN or mobile data service yet).
- the NFC channel 110 can establish a secure and/or encrypted link over short distances (e.g., 1 to 2 centimeters, . . . ) between the device 120 and the server 130 .
- the encryption utilized can be a handshake (e.g., 4 way handshake) to establish a secure link on top of an “open” NFC channel associated with the NFC channel 110 .
- NFC technology permits wireless communication between devices across a narrow distance of 1 meter down to 2 centimeters or less.
- the air link and protocols are similar to those used by contactless smart cards and RFID, though there are differences in practice at multiple layers in the architecture.
- SMS Traditional Wireless Application Protocol
- SMS push Service Indication/Service Loading uses the GSM Short-Message Service. Since SMS requires prior identification of the device, it prevents unsolicited push of service indicators or service loading.
- SMS-C SMS Center gateway. SMS is also a measured-rate service to all but the subscriber's mobile operator.
- the system 100 overcomes the limitations of conventional wireless technologies (e.g., Bluetooth, Infrared beaming (IrDA) etc.) by employing Near-Field Communication.
- the server 130 and the device 120 can each include an antenna 140 , 150 and a transceiver (including RF circuitry) 160 , 170 (e.g., that comply with the ISO/IEC 18092:2004 standard).
- the device 120 and the server 130 e.g., NFC node
- the device 130 can act as a node while a server 120 discovers and reads/transmits data to the server 120 .
- the device 120 can, optionally, further include driver software 174 , and layered protocol software 178 which interfaces with the device embedded operating software 182 .
- the system 100 employs the NFC channel 110 as a device management and/or provisioning interface for mobile device(s) 120 .
- NFC has several notable advantages as a bearer of over-the-air provisioning and/or device management when compared to conventional system(s).
- NFC has selectivity ranging from one meter down to a couple of centimeters and does not require prior knowledge of a specific device address. Further, NFC does not require a line of sight (as IrDA does), in fact, NFC can work through clothing and/or retail packaging.
- device discovery and detection is through broadcast and response, but within short-range, unlike Bluetooth whose range is up to 30 feet.
- the NFC channel 110 is local, thus, the device 120 is not exposed to general Internet or intranet traffic.
- the NFC channel 110 employs an unlicensed frequency spectrum and thus is not burdened by access fees.
- NFC is suitable for (e.g., designed for) use in a production line environment. Accordingly, the fast association times and collision detection and resolution features of NFC are ideal for in-factory configuration and customization of device(s) 120 .
- NFC channel 110 is designed for ultra-low power operation and can remain passive until in the presence of a reader.
- NFC has local selectivity as it's range is limited to less than one meter.
- NFC uses a low-cost device antenna system that can be integrated (e.g., directly) into paper and plastic packaging.
- the NFC channel 110 is further designed for low-complexity.
- the NFC channel 110 can be employed in active and/or passive mode as a channel for provisioning and/or managing mobile device(s) 120 .
- the server 130 as initiator With respect to the passive mode, the server 130 as initiator generates an RF field which permits the NFC circuitry of the device 120 to power itself from the RF field and to accept small amounts of data without main power applied (e.g., without a battery or other power source).
- the passive mode can be used, for example, to provision device(s) 120 and/or extract device capability and description document(s) and/or device identification (such as a serial number) while power is not applied and/or a power source (e.g., battery) is removed.
- the NFC channel 110 can be employed to trigger a power-on or wake to permit dispatch of an NFC event that occurs while the device 120 is in the “off” state.
- the NFC circuitry appears to the embedded OS as another communication channel on which layered protocols can be exposed through existing service elements in the device 120 .
- NFC can be exposed as a physical network interface, a TCP/IP interface, OBEX endpoint, SOAP endpoint, SyncML client or server, FTP client or server, and/or other data communication protocol endpoint.
- the system 100 can employ the NFC channel 110 in the active and/or passive mode as a channel for provisioning the mobile device 120 (e.g., with content and/or setting(s).
- the system 100 can utilize the NFC channel 110 , in combination with other standardized and/or proprietary service elements, to expose these communication endpoints through a “touch target” by simply aligning the device with another NFC-capable device (e.g., server 130 ) that supports compatible communication protocols.
- provisioning files are received during the passive state and can be buffered.
- the buffer can be inspected and any valid and authorized content and/or setting(s) can be retrieved and applied to the device.
- this content and related settings can take the form of a URL which points to the content (e.g., either in the device's ROM, the device's file system and/or somewhere external to the device such as the Internet).
- the content and related settings can take the form of a data archive package (e.g., a CAB, ZIP and/or JAR file).
- Content over the NFC channel 110 can be in a standardized format such as, for example, Open Mobile Alliance (OMA) Client Provisioning, OMA Device Management Tree and Description Serialization (TNDS), OMA Device Management Notification Initiated Session, data sync protocol (SyncML) and/or in a proprietary format. Content can further be based on Simple Network Management Protocol (SNMP). Further, utilizing a push data format, the server 130 can provide for Service Indication/Service Loading over the NFC channel 110 . Additionally, the device 120 can expose Universal Plug and Play (UPNP) protocols and device capability document(s) and/or a unique device identification code across the NFC channel 110 .
- UPNP Universal Plug and Play
- content can be signed for authorization and/or integrity purposes.
- content can carry no explicit guarantees of authenticity relying instead on other means for authentication and validation.
- NFC can bring selectivity to augment other wireless technologies such as Bluetooth or WLAN which lack selectivity due to their range (e.g., in excess of 30 feet).
- NFC is designed to operate in deployments at under one meter between base station (e.g., server 130 ) and device—with maximum ranges designed to as low as a several centimeters.
- base station e.g., server 130
- maximum ranges designed to as low as a several centimeters.
- NFC can be used as the activating means by which a user expresses intent to establish a session while BT/WLAN continue and carry the payload data of the application session.
- the NFC channel 110 can be employed as a packet data session initiator, an application session initiator and/or a service availability and status indicator (e.g., service advertisement).
- content can be provisioned, for example:
- system 100 the device 120 , the server 130 , the transceiver 160 , 170 , the driver software 174 , the layered protocol software 178 and/or the embedded operating system 182 can be computer components as that term is defined herein.
- FIGS. 4-6 methodologies that may be implemented in accordance with the claimed subject matter are illustrated. While, for purposes of simplicity of explanation, the methodologies are shown and described as a series of blocks, it is to be understood and appreciated that the claimed subject matter is not limited by the order of the blocks, as some blocks may, in accordance with the claimed subject matter, occur in different orders and/or concurrently with other blocks from that shown and described herein. Moreover, not all illustrated blocks may be required to implement the methodologies.
- program modules include routines, programs, objects, data structures, etc. that perform particular tasks or implement particular abstract data types.
- functionality of the program modules may be combined or distributed as desired in various embodiments.
- a method of provisioning and/or managing device configuration 400 is illustrated.
- a determination is made as to whether a device is within range (e.g., of a server). If the determination at 410 is NO, processing continues at 410 .
- an NFC channel is established with the device.
- content is provisioned and/or device configuration is managed.
- an NFC channel is established (e.g., with a server).
- content and/or device configuration information is received.
- a method of provisioning and/or managing device configuration 600 is illustrated.
- a device is in a non-powered state.
- NFC circuitry of the device receives power via an NFC channel.
- the NFC channel is established with a server.
- the device receives content and/or device configuration information.
- the received content and/or device configuration information is stored, for example, in a buffer (e.g., for use by the device when powered). Thereafter, when the device is in a powered stated, the stored content and/or device configuration information can be retrieved and applied to the device.
- FIG. 7 and the following discussion are intended to provide a brief, general description of a suitable operating environment 710 . While the claimed subject matter is described in the general context of computer-executable instructions, such as program modules, executed by one or more computers or other devices, those skilled in the art will recognize that the claimed subject matter can also be implemented in combination with other program modules and/or as a combination of hardware and software. Generally, however, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular data types.
- the operating environment 710 is only one example of a suitable operating environment and is not intended to suggest any limitation as to the scope of use or functionality of the claimed subject matter.
- an exemplary environment 710 includes a computer 712 .
- the computer 712 includes a processing unit 714 , a system memory 716 , and a system bus 718 .
- the system bus 718 couples system components including, but not limited to, the system memory 716 to the processing unit 714 .
- the processing unit 714 can be any of various available processors. Dual microprocessors and other multiprocessor architectures also can be employed as the processing unit 714 .
- the system bus 718 can be any of several types of bus structure(s) including the memory bus or memory controller, a peripheral bus or external bus, and/or a local bus using any variety of available bus architectures including, but not limited to, an 8-bit bus, Industrial Standard Architecture (ISA), Micro-Channel Architecture (MSA), Extended ISA (EISA), Intelligent Drive Electronics (IDE), VESA Local Bus (VLB), Peripheral Component Interconnect (PCI), Universal Serial Bus (USB), IEEE 1394/Firewire, Advanced Graphics Port (AGP), Personal Computer Memory Card International Association bus (PCMCIA), and Small Computer Systems Interface (SCSI).
- ISA Industrial Standard Architecture
- MSA Micro-Channel Architecture
- EISA Extended ISA
- IDE Intelligent Drive Electronics
- VLB VESA Local Bus
- PCI Peripheral Component Interconnect
- USB Universal Serial Bus
- IEEE 1394/Firewire Advanced Graphics Port
- AGP Advanced Graphics Port
- PCMCIA Personal Computer Memory Card International Association bus
- SCSI Small Computer
- the system memory 716 includes volatile memory 720 and nonvolatile memory 722 .
- the basic input/output system (BIOS) containing the basic routines to transfer information between elements within the computer 712 , such as during start-up, is stored in nonvolatile memory 722 .
- nonvolatile memory 722 can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM), or flash memory.
- Volatile memory 720 includes random access memory (RAM), which acts as external cache memory.
- RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM).
- SRAM synchronous RAM
- DRAM dynamic RAM
- SDRAM synchronous DRAM
- DDR SDRAM double data rate SDRAM
- ESDRAM enhanced SDRAM
- SLDRAM Synchlink DRAM
- DRRAM direct Rambus RAM
- Disk storage 724 includes, but is not limited to, devices like a magnetic disk drive, floppy disk drive, tape drive, Jaz drive, Zip drive, LS-100 drive, flash memory card, or memory stick.
- disk storage 724 can include storage media separately or in combination with other storage media including, but not limited to, an optical disk drive such as a compact disk ROM device (CD-ROM), CD recordable drive (CD-R Drive), CD rewritable drive (CD-RW Drive) or a digital versatile disk ROM drive (DVD-ROM).
- an optical disk drive such as a compact disk ROM device (CD-ROM), CD recordable drive (CD-R Drive), CD rewritable drive (CD-RW Drive) or a digital versatile disk ROM drive (DVD-ROM).
- a removable or non-removable interface is typically used such as interface 726 .
- FIG. 7 describes software that acts as an intermediary between users and the basic computer resources described in suitable operating environment 710 .
- Such software includes an operating system 728 .
- Operating system 728 which can be stored on disk storage 724 or non-volatile memory, acts to control and allocate resources of the computer system 712 .
- System applications 730 take advantage of the management of resources by operating system 728 through program modules 732 and program data 734 stored either in system memory 716 or on disk storage 724 . It is to be appreciated that the claimed subject matter can be implemented with various operating systems or combinations of operating systems.
- Input devices 736 include, but are not limited to, a pointing device such as a mouse, trackball, stylus, touch pad, keyboard, microphone, joystick, game pad, satellite dish, scanner, TV tuner card, digital camera, digital video camera, web camera, and the like. These and other input devices connect to the processing unit 714 through the system bus 718 via interface port(s) 738 .
- Interface port(s) 738 include, for example, a serial port, a parallel port, a game port, a Universal Serial Bus (USB) and an IEEE 1394/Firewire port.
- Output device(s) 740 use some of the same type of ports as input device(s) 736 .
- a USB port may be used to provide input to computer 712 , and to output information from computer 712 to an output device 740 .
- Output adapter 742 is provided to illustrate that there are some output devices 740 like monitors, speakers, and printers among other output devices 740 that require special adapters.
- the output adapters 742 include, by way of illustration and not limitation, video and sound cards that provide a means of connection between the output device 740 and the system bus 718 . It should be noted that other devices and/or systems of devices provide both input and output capabilities such as remote computer(s) 744 .
- Computer 712 can operate in a networked environment using logical connections to one or more remote computers, such as remote computer(s) 744 .
- the remote computer(s) 744 can be a personal computer, a server, a router, a network PC, a workstation, a microprocessor based appliance, a peer device or other common network node and the like, and typically includes many or all of the elements described relative to computer 712 .
- only a memory storage device 746 is illustrated with remote computer(s) 744 .
- Remote computer(s) 744 is logically connected to computer 712 through a network interface 748 and then physically connected via communication connection 750 .
- Network interface 748 encompasses communication networks such as local-area networks (LAN) and wide-area networks (WAN).
- LAN technologies include Fiber Distributed Data Interface (FDDI), Copper Distributed Data Interface (CDDI), Ethernet/IEEE 802.3, Token Ring/IEEE 802.5, wireless LAN/IEEE 802.11 and the like.
- WAN technologies include, but are not limited to, point-to-point links, circuit switching networks like Integrated Services Digital Networks (ISDN) and variations thereon, packet switching networks, Digital Subscriber Lines (DSL), and wireless metropolitan area networks 802.16/Wi-MAX.
- ISDN Integrated Services Digital Networks
- DSL Digital Subscriber Lines
- Communication connection(s) 750 refers to the hardware/software employed to connect the network interface 748 to the bus 718 . While communication connection 750 is shown for illustrative clarity inside computer 712 , it can also be external to computer 712 .
- the hardware/software necessary for connection to the network interface 748 includes, for exemplary purposes only, internal and external technologies such as, modems including regular telephone grade modems, cable modems and DSL modems, ISDN adapters, and Ethernet cards.
Abstract
Description
- The electronic industry has vastly improved upon providing a range or degree of freedom associated with employment of wireless networks and/or devices. Wireless networks and/or devices such as, but not limited to, wireless local area networks (WLAN), Bluetooth, local area network (LAN), sub-networks (e.g., wireless mouse and personal computer), portable digital assistants (PDA's), mice, keyboards, speakers, monitors, routers, phones, cellular communication devices, wireless devices, access points, hubs, . . . facilitate functionality with mitigation of wires and accompanied restrictions. In addition to providing degree(s) of freedom, wireless devices and/or networks are advantageous to hard-wired networks and/or devices for numerous reasons.
- Traditional Wireless Application Protocol (WAP) Push Service Indication/Service Loading uses the GSM Short-Message Service. Since SMS requires prior identification of the device, it prevents unsolicited push of service indicators or service loading. Further, use of SMS as a push data bearer assumes a device with a GSM radio, active service account with phone number assigned, and access by the server to the SMS-C (SMS Center) gateway. SMS is also a measured-rate service to all but the subscriber's mobile operator.
- There are existing alternatives to SMS that can be used to push data to a mobile device. Existing device management solutions utilize these modalities including SMS, IrDA, Bluetooth, and HTTP. But these solutions suffer when applied to point-of-sale, point-of-service applications:
-
- SMS requires a GSM radio and is mobile operator specific.
- IrDA is line-of-sight—specific orientation of receiver is required.
- IrDA often requires device setup to receive beams.
- HTTP requires an active network connection to at least a WLAN. For this to be available, substantial configuration must have already occurred; security requirements for Internet connections, including firewall and NAT limitations, prevent server-activated sessions—end-user interaction most-likely required.
- HTTP sessions often carry over the global Internet—discoverability and addressability of the correct local resource (e.g. this kiosk, not the one next door or one in the next county) is problematic.
- Browser-based user-initiated sessions are problematic for small form-factor mobile devices.
- Bluetooth range is up to 30 feet which makes it less selective for kiosk-type applications.
- This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
- A device provisioning and/or configuration system and method are provided. The system employs a near field communication (NFC) channel in an active and/or passive mode as a channel for provisioning and/or managing mobile device(s) (e.g., with content and/or setting(s)) by a server. The device can be any device that can employ a near field communication channel (e.g., phone, cellular communication device, portable digital assistant (PDA), handheld game console, media player . . . ).
- The system provides a mechanism for pushing device configuration and/or service indicator(s), for example, through a point-of-sale and/or point-of-service. Significantly, the system utilizes NFC which facilitates selectivity to ensure that only the target device is configured. The NFC-capable device thus exposes its management interface(s) across the NFC channel. Additionally, device(s) can be in factory-configured state without general connectivity (e.g., no WLAN or mobile data service yet).
- NFC technology permits wireless communication between devices across a narrow distance of 1 meter down to 2 centimeters or less. The air link and protocols are similar to those used by contactless smart cards and RFID, though there are differences in practice at multiple layers in the architecture.
- The server and the device can each include an antenna and a transceiver (including RF circuitry) (e.g., that comply with the ISO/IEC 18092:2004 standard). When the device and the server (e.g., NFC node) are brought within range, the server data can be read by the device. Alternatively, the device can act as a node while a server discovers and reads/transmits data to the server.
- The system employs the NFC channel as a device management and/or provisioning interface for mobile device(s). NFC has several notable advantages as a bearer of over-the-air provisioning and/or device management when compared to conventional system(s). NFC has selectivity ranging from one meter down to a couple of centimeters and does not require prior knowledge of a specific device address. Further, NFC does not require a line of sight (as IRDA does), in fact, NFC can work through clothing and/or retail packaging. With NFC, device discovery and detection is through broadcast and response, but within short-range, unlike Bluetooth whose range is up to thirty feet. The NFC channel is local, thus, the device is not exposed to general Internet or intranet traffic. The NFC channel employs an unlicensed frequency spectrum and thus is not burdened by access fees. Finally, NFC is suitable for (e.g., designed for) use in a production line environment. Accordingly, the fast association times and collision detection and avoidance features of NFC are ideal for in-factory configuration and customization of device(s).
- An additional benefit of the NFC channel is that it is designed for ultra-low power operation and can remain passive until in the presence of a reader. As noted above, NFC has local selectivity as it's range is limited to less than one meter. Additionally, NFC uses a low-cost device antenna system that can be integrated (e.g., directly) into paper and plastic packaging.
- As noted previously, the NFC channel can be employed in active and/or passive mode as a channel for provisioning and/or managing mobile device(s). With respect to the passive mode, the server, as initiator, generates an RF field which permits the NFC circuitry of the device to power itself from the RF field and to accept small amounts of data without main power applied (e.g., without a battery or other power source).
- The passive mode can be used, for example, to provision device(s) and/or extract device capability document(s) while power is not applied and/or a power source (e.g., batter) is removed. For example, with the device in passive mode, the NFC channel can be employed to trigger a power-on or wake to permit dispatch of an NFC event that occurs while the device is in the “off” state.
- In the un-powered or passive mode, provisioning files can be received during the passive state and can be buffered. When power is applied, the buffer can be inspected and any valid and authorized content and/or setting(s) can be retrieved and applied to the device. For example, this content and related settings can take the form of a URL which points to the content (e.g., either in the device's ROM, the device's file system and/or somewhere external to the device such as the Internet). In another example, the content and related settings can take the form of a data archive package (e.g., a CAB, ZIP and/or JAR file). Content over the NFC channel can be in a standardized format and/or in a proprietary format.
- With “active mode” (also referred to as “powered” or “non-passive”), the NFC circuitry appears to the embedded operating system as another communication channel on which layered protocols can be exposed through existing service elements in the device. For example, NFC can be exposed as a physical network interface, a TCP/IP interface, OBEX endpoint, SOAP endpoint, SyncML client or server, FTP client or server, and/or other data communication protocol endpoint.
- The system can employ the NFC channel in the active and/or passive mode as a channel for provisioning the mobile device (e.g., with content and/or setting(s). The system can utilize the NFC channel, in combination with other standardized and/or proprietary service elements, to expose these communication endpoints through a “touch target” by simply aligning the device with another NFC-capable device (e.g., server) that supports compatible communication protocols. and/or managing device
- To the accomplishment of the foregoing and related ends, certain illustrative aspects are described herein in connection with the following description and the annexed drawings. These aspects are indicative, however, of but a few of the various ways in which the principles of the claimed subject matter may be employed and the claimed subject matter is intended to include all such aspects and their equivalents. Other advantages and novel features of the claimed subject matter may become apparent from the following detailed description when considered in conjunction with the drawings.
-
FIG. 1 is a block diagram of a device configuration system. -
FIG. 2 is a block diagram of a device configuration system. -
FIG. 3 is a block diagram of a device configuration system. -
FIG. 4 is a flow chart of a method of provisioning and/or managing device configuration. -
FIG. 5 is a flow chart of a method of provisioning and/or managing device configuration. -
FIG. 6 is a flow chart of a method of provisioning and/or managing device configuration. -
FIG. 7 illustrates an example operating environment. - The claimed subject matter is now described with reference to the drawings, wherein like reference numerals are used to refer to like elements throughout. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the claimed subject matter. It may be evident, however, that the claimed subject matter may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to facilitate describing the claimed subject matter.
- As used in this application, the terms “component,” “handler,” “model,” “system,” and the like are intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a server and the server can be a component. One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers. Also, these components can execute from various computer readable media having various data structures stored thereon. The components may communicate via local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as the Internet with other systems via the signal). Computer components can be stored, for example, on computer readable media including, but not limited to, an ASIC (application specific integrated circuit), CD (compact disc), DVD (digital video disk), ROM (read only memory), floppy disk, hard disk, EEPROM (electrically erasable programmable read only memory) and memory stick in accordance with the claimed subject matter.
- Referring to
FIG. 1 , adevice configuration system 100 is illustrated. Thesystem 100 employs a near field communication (NFC)channel 110 in an active and/or passive mode as a channel for provisioning and/or managing mobile device(s) 120 (e.g., with content and/or setting(s)). Thedevice 120 can be any device that can employ a near field communication channel 110 (e.g., a computer, a network, wireless keyboard, speaker, mouse, monitor, headset, headphones, remote, router, access point, printer, hard drive, modem, microphone, phone, cellular communication device, portable digital assistant (PDA), handheld game console, media player . . . ). - Optionally, in addition to NFC capabilities, the
device 120 can have other wireless data transmission capability(ies) (e.g., mobile cellular data, third generation (3G), General Packet Radio Service (GPRS), Code-Division Multiple Access (CDMA), Wideband Code-Division Multiple Access (W-CDMA), wireless fidelity (Wi-Fi), IEEE 802.16 (WiMAX), 802.11, Bluetooth, Ultra Wide-Band, IrDA, etc.). Further, thedevice 120 can have hard-wired data transmission capability(ies) including, for example, wired Ethernet, USB, IEEE 1394, FireWire, power line data transmission and/or other wired communication link. Finally, thedevice 120 can be a device designed specifically for storage and transmission of device provisioning setting(s) and/or content (e.g., token). - The
system 100 thus provides a mechanism for pushing device configuration and/or service indicator(s), for example, through a point-of-sale and/or point-of-service. Significantly, thesystem 100 utilizes NFC which facilitates selectivity to ensure that only thetarget device 120 is configured. The NFC-capable device 120 thus exposes its management interface(s) across theNFC channel 110. Additionally, device(s) 120 can be in factory-configured state without general connectivity (e.g., no WLAN or mobile data service yet). - Optionally, the
NFC channel 110 can establish a secure and/or encrypted link over short distances (e.g., 1 to 2 centimeters, . . . ) between thedevice 120 and theserver 130. For example, the encryption utilized can be a handshake (e.g., 4 way handshake) to establish a secure link on top of an “open” NFC channel associated with theNFC channel 110. - NFC technology permits wireless communication between devices across a narrow distance of 1 meter down to 2 centimeters or less. The air link and protocols are similar to those used by contactless smart cards and RFID, though there are differences in practice at multiple layers in the architecture.
- Traditional Wireless Application Protocol (WAP) Push Service Indication/Service Loading uses the GSM Short-Message Service. Since SMS requires prior identification of the device, it prevents unsolicited push of service indicators or service loading. Use of SMS as a push data bearer assumes a device with a GSM radio, active service account with phone number assigned, and access by the server to the SMS-C (SMS Center) gateway. SMS is also a measured-rate service to all but the subscriber's mobile operator.
- Existing device management systems utilize SMS, Infrared beaming (IrDA), Bluetooth, and/or HTTP. However, these systems have proven difficult to employ when applied to point-of-sale and/or point-of-service applications. Several of the difficulties include:
-
- SMS requires a GSM radio and is mobile operator specific.
- IrDA is line-of-sight—specific orientation of receiver is required.
- IrDA often requires device setup to receive beams.
- HTTP requires an active network connection to at least a WLAN. For this to be available, substantial configuration must have already occurred; security requirements for Internet connections, including firewall and NAT limitations, prevent server-activated sessions—end-user interaction most-likely required.
- HTTP sessions often carry over the global Internet—discoverability and addressability of the correct local resource (e.g. this kiosk, not the one next door or one in the next county) is problematic.
- Browser-based user-initiated sessions are problematic for small form-factor mobile devices.
- Bluetooth is more complex and more power-intensive than a simple NFC/RFID transponder.
- Bluetooth range is up to 30 feet which makes it less selective for close-range (e.g., kiosk-type) application(s).
- The
system 100 overcomes the limitations of conventional wireless technologies (e.g., Bluetooth, Infrared beaming (IrDA) etc.) by employing Near-Field Communication. Referring briefly toFIG. 2 , theserver 130 and thedevice 120 can each include anantenna device 120 and the server 130 (e.g., NFC node) are brought within range, theserver 130's data can be read by thedevice 120. Alternatively, thedevice 130 can act as a node while aserver 120 discovers and reads/transmits data to theserver 120. Thedevice 120 can, optionally, further includedriver software 174, andlayered protocol software 178 which interfaces with the device embeddedoperating software 182. - Referring back to
FIG. 1 , as noted previously, thesystem 100 employs theNFC channel 110 as a device management and/or provisioning interface for mobile device(s) 120. NFC has several notable advantages as a bearer of over-the-air provisioning and/or device management when compared to conventional system(s). NFC has selectivity ranging from one meter down to a couple of centimeters and does not require prior knowledge of a specific device address. Further, NFC does not require a line of sight (as IrDA does), in fact, NFC can work through clothing and/or retail packaging. With NFC, device discovery and detection is through broadcast and response, but within short-range, unlike Bluetooth whose range is up to 30 feet. TheNFC channel 110 is local, thus, thedevice 120 is not exposed to general Internet or intranet traffic. TheNFC channel 110 employs an unlicensed frequency spectrum and thus is not burdened by access fees. Finally, NFC is suitable for (e.g., designed for) use in a production line environment. Accordingly, the fast association times and collision detection and resolution features of NFC are ideal for in-factory configuration and customization of device(s) 120. - An additional benefit of the
NFC channel 110 is that it is designed for ultra-low power operation and can remain passive until in the presence of a reader. As noted above, NFC has local selectivity as it's range is limited to less than one meter. Additionally, NFC uses a low-cost device antenna system that can be integrated (e.g., directly) into paper and plastic packaging. TheNFC channel 110 is further designed for low-complexity. - Active and Passive Modes
- As noted previously, the
NFC channel 110 can be employed in active and/or passive mode as a channel for provisioning and/or managing mobile device(s) 120. With respect to the passive mode, theserver 130 as initiator generates an RF field which permits the NFC circuitry of thedevice 120 to power itself from the RF field and to accept small amounts of data without main power applied (e.g., without a battery or other power source). The passive mode can be used, for example, to provision device(s) 120 and/or extract device capability and description document(s) and/or device identification (such as a serial number) while power is not applied and/or a power source (e.g., battery) is removed. For example, with thedevice 120 in passive mode, theNFC channel 110 can be employed to trigger a power-on or wake to permit dispatch of an NFC event that occurs while thedevice 120 is in the “off” state. - With “active mode” (also referred to as “powered” or “non-passive”), the NFC circuitry appears to the embedded OS as another communication channel on which layered protocols can be exposed through existing service elements in the
device 120. For example, NFC can be exposed as a physical network interface, a TCP/IP interface, OBEX endpoint, SOAP endpoint, SyncML client or server, FTP client or server, and/or other data communication protocol endpoint. - Provisioning of
Mobile Device 120 - The
system 100 can employ theNFC channel 110 in the active and/or passive mode as a channel for provisioning the mobile device 120 (e.g., with content and/or setting(s). For example, thesystem 100 can utilize theNFC channel 110, in combination with other standardized and/or proprietary service elements, to expose these communication endpoints through a “touch target” by simply aligning the device with another NFC-capable device (e.g., server 130) that supports compatible communication protocols. - In the un-powered or passive mode, provisioning files are received during the passive state and can be buffered. When power is applied, the buffer can be inspected and any valid and authorized content and/or setting(s) can be retrieved and applied to the device. For example, this content and related settings can take the form of a URL which points to the content (e.g., either in the device's ROM, the device's file system and/or somewhere external to the device such as the Internet). In another example, the content and related settings can take the form of a data archive package (e.g., a CAB, ZIP and/or JAR file).
- Content over the
NFC channel 110 can be in a standardized format such as, for example, Open Mobile Alliance (OMA) Client Provisioning, OMA Device Management Tree and Description Serialization (TNDS), OMA Device Management Notification Initiated Session, data sync protocol (SyncML) and/or in a proprietary format. Content can further be based on Simple Network Management Protocol (SNMP). Further, utilizing a push data format, theserver 130 can provide for Service Indication/Service Loading over theNFC channel 110. Additionally, thedevice 120 can expose Universal Plug and Play (UPNP) protocols and device capability document(s) and/or a unique device identification code across theNFC channel 110. - Optionally, content can be signed for authorization and/or integrity purposes. Alternatively, content can carry no explicit guarantees of authenticity relying instead on other means for authentication and validation.
- Accordingly, NFC can bring selectivity to augment other wireless technologies such as Bluetooth or WLAN which lack selectivity due to their range (e.g., in excess of 30 feet). As noted above, NFC is designed to operate in deployments at under one meter between base station (e.g., server 130) and device—with maximum ranges designed to as low as a several centimeters. For example, once a Bluetooth or WLAN link has been established, user intent to establish communication with a specific application becomes vague and confined to application-specific means. However, with the
system 100, NFC can be used as the activating means by which a user expresses intent to establish a session while BT/WLAN continue and carry the payload data of the application session. - As illustrated in
FIG. 3 , with thesystem 100, theNFC channel 110 can be employed as a packet data session initiator, an application session initiator and/or a service availability and status indicator (e.g., service advertisement). Via theNFC channel 110, content can be provisioned, for example: -
- Delivery of ring-tone(s), screen art, application(s), Web bookmarks and/or user-interface elements such as menus and “themes”.
- Provisioning/activation/deactivation of user experience profiles or preferences (e.g., activate silent mode in a conference room or restaurant).
- DRM (Digital Rights Management) license delivery and renewal for protected content. For example, as a second factor in DRM license fulfillment—that is, license to content only valid while in the presence of a specific NFC node.
- Delivery of factory customization and configure-to-order on a per-unit basis in a production line environment.
- Customization and configuration at retail point-of-sale or point-of-service.
- It is to be appreciated that the
system 100, thedevice 120, theserver 130, thetransceiver driver software 174, thelayered protocol software 178 and/or the embeddedoperating system 182 can be computer components as that term is defined herein. - Turning briefly to
FIGS. 4-6 , methodologies that may be implemented in accordance with the claimed subject matter are illustrated. While, for purposes of simplicity of explanation, the methodologies are shown and described as a series of blocks, it is to be understood and appreciated that the claimed subject matter is not limited by the order of the blocks, as some blocks may, in accordance with the claimed subject matter, occur in different orders and/or concurrently with other blocks from that shown and described herein. Moreover, not all illustrated blocks may be required to implement the methodologies. - The claimed subject matter may be described in the general context of computer-executable instructions, such as program modules, executed by one or more components. Generally, program modules include routines, programs, objects, data structures, etc. that perform particular tasks or implement particular abstract data types. Typically the functionality of the program modules may be combined or distributed as desired in various embodiments.
- Referring to
FIG. 4 , a method of provisioning and/or managingdevice configuration 400 is illustrated. At 410, a determination is made as to whether a device is within range (e.g., of a server). If the determination at 410 is NO, processing continues at 410. - If the determination at 410 is YES, at 420, an NFC channel is established with the device. At 430, content is provisioned and/or device configuration is managed.
- Next, turning to
FIG. 5 , a method of provisioning and/or managingdevice configuration 500 is illustrated. At 510, an NFC channel is established (e.g., with a server). At 520, content and/or device configuration information is received. - Referring to
FIG. 6 , a method of provisioning and/or managingdevice configuration 600 is illustrated. At 610, a device is in a non-powered state. At 620, NFC circuitry of the device receives power via an NFC channel. - At 630, the NFC channel is established with a server. At 640, the device receives content and/or device configuration information. At 650, the received content and/or device configuration information is stored, for example, in a buffer (e.g., for use by the device when powered). Thereafter, when the device is in a powered stated, the stored content and/or device configuration information can be retrieved and applied to the device.
- In order to provide additional context for various aspects of the claimed subject matter,
FIG. 7 and the following discussion are intended to provide a brief, general description of asuitable operating environment 710. While the claimed subject matter is described in the general context of computer-executable instructions, such as program modules, executed by one or more computers or other devices, those skilled in the art will recognize that the claimed subject matter can also be implemented in combination with other program modules and/or as a combination of hardware and software. Generally, however, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular data types. The operatingenvironment 710 is only one example of a suitable operating environment and is not intended to suggest any limitation as to the scope of use or functionality of the claimed subject matter. Other well known computer systems, environments, and/or configurations that may be suitable for use with the claimed subject matter include but are not limited to, personal computers, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include the above systems or devices, and the like. - With reference to
FIG. 7 , anexemplary environment 710 includes acomputer 712. Thecomputer 712 includes aprocessing unit 714, asystem memory 716, and asystem bus 718. Thesystem bus 718 couples system components including, but not limited to, thesystem memory 716 to theprocessing unit 714. Theprocessing unit 714 can be any of various available processors. Dual microprocessors and other multiprocessor architectures also can be employed as theprocessing unit 714. - The
system bus 718 can be any of several types of bus structure(s) including the memory bus or memory controller, a peripheral bus or external bus, and/or a local bus using any variety of available bus architectures including, but not limited to, an 8-bit bus, Industrial Standard Architecture (ISA), Micro-Channel Architecture (MSA), Extended ISA (EISA), Intelligent Drive Electronics (IDE), VESA Local Bus (VLB), Peripheral Component Interconnect (PCI), Universal Serial Bus (USB), IEEE 1394/Firewire, Advanced Graphics Port (AGP), Personal Computer Memory Card International Association bus (PCMCIA), and Small Computer Systems Interface (SCSI). - The
system memory 716 includesvolatile memory 720 andnonvolatile memory 722. The basic input/output system (BIOS), containing the basic routines to transfer information between elements within thecomputer 712, such as during start-up, is stored innonvolatile memory 722. By way of illustration, and not limitation,nonvolatile memory 722 can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM), or flash memory.Volatile memory 720 includes random access memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM). -
Computer 712 also includes removable/nonremovable, volatile/nonvolatile computer storage media.FIG. 7 illustrates, for example adisk storage 724.Disk storage 724 includes, but is not limited to, devices like a magnetic disk drive, floppy disk drive, tape drive, Jaz drive, Zip drive, LS-100 drive, flash memory card, or memory stick. In addition,disk storage 724 can include storage media separately or in combination with other storage media including, but not limited to, an optical disk drive such as a compact disk ROM device (CD-ROM), CD recordable drive (CD-R Drive), CD rewritable drive (CD-RW Drive) or a digital versatile disk ROM drive (DVD-ROM). To facilitate connection of thedisk storage devices 724 to thesystem bus 718, a removable or non-removable interface is typically used such asinterface 726. - It is to be appreciated that
FIG. 7 describes software that acts as an intermediary between users and the basic computer resources described insuitable operating environment 710. Such software includes anoperating system 728.Operating system 728, which can be stored ondisk storage 724 or non-volatile memory, acts to control and allocate resources of thecomputer system 712.System applications 730 take advantage of the management of resources byoperating system 728 throughprogram modules 732 andprogram data 734 stored either insystem memory 716 or ondisk storage 724. It is to be appreciated that the claimed subject matter can be implemented with various operating systems or combinations of operating systems. - A user enters commands or information into the
computer 712 through input device(s) 736.Input devices 736 include, but are not limited to, a pointing device such as a mouse, trackball, stylus, touch pad, keyboard, microphone, joystick, game pad, satellite dish, scanner, TV tuner card, digital camera, digital video camera, web camera, and the like. These and other input devices connect to theprocessing unit 714 through thesystem bus 718 via interface port(s) 738. Interface port(s) 738 include, for example, a serial port, a parallel port, a game port, a Universal Serial Bus (USB) and an IEEE 1394/Firewire port. Output device(s) 740 use some of the same type of ports as input device(s) 736. Thus, for example, a USB port may be used to provide input tocomputer 712, and to output information fromcomputer 712 to anoutput device 740.Output adapter 742 is provided to illustrate that there are someoutput devices 740 like monitors, speakers, and printers amongother output devices 740 that require special adapters. Theoutput adapters 742 include, by way of illustration and not limitation, video and sound cards that provide a means of connection between theoutput device 740 and thesystem bus 718. It should be noted that other devices and/or systems of devices provide both input and output capabilities such as remote computer(s) 744. -
Computer 712 can operate in a networked environment using logical connections to one or more remote computers, such as remote computer(s) 744. The remote computer(s) 744 can be a personal computer, a server, a router, a network PC, a workstation, a microprocessor based appliance, a peer device or other common network node and the like, and typically includes many or all of the elements described relative tocomputer 712. For purposes of brevity, only amemory storage device 746 is illustrated with remote computer(s) 744. Remote computer(s) 744 is logically connected tocomputer 712 through anetwork interface 748 and then physically connected viacommunication connection 750.Network interface 748 encompasses communication networks such as local-area networks (LAN) and wide-area networks (WAN). LAN technologies include Fiber Distributed Data Interface (FDDI), Copper Distributed Data Interface (CDDI), Ethernet/IEEE 802.3, Token Ring/IEEE 802.5, wireless LAN/IEEE 802.11 and the like. WAN technologies include, but are not limited to, point-to-point links, circuit switching networks like Integrated Services Digital Networks (ISDN) and variations thereon, packet switching networks, Digital Subscriber Lines (DSL), and wireless metropolitan area networks 802.16/Wi-MAX. - Communication connection(s) 750 refers to the hardware/software employed to connect the
network interface 748 to thebus 718. Whilecommunication connection 750 is shown for illustrative clarity insidecomputer 712, it can also be external tocomputer 712. The hardware/software necessary for connection to thenetwork interface 748 includes, for exemplary purposes only, internal and external technologies such as, modems including regular telephone grade modems, cable modems and DSL modems, ISDN adapters, and Ethernet cards. - What has been described above includes examples of the claimed subject matter. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the claimed subject matter, but one of ordinary skill in the art may recognize that many further combinations and permutations of the claimed subject matter are possible. Accordingly, the claimed subject matter is intended to embrace all such alterations, modifications and variations that fall within the spirit and scope of the appended claims. Furthermore, to the extent that the term “includes” is used in either the detailed description or the claims, such term is intended to be inclusive in a manner similar to the term “comprising” as “comprising” is interpreted when employed as a transitional word in a claim.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/354,508 US8718554B2 (en) | 2006-02-15 | 2006-02-15 | Means for provisioning and managing mobile device configuration over a near-field communication link |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/354,508 US8718554B2 (en) | 2006-02-15 | 2006-02-15 | Means for provisioning and managing mobile device configuration over a near-field communication link |
Publications (2)
Publication Number | Publication Date |
---|---|
US20070190939A1 true US20070190939A1 (en) | 2007-08-16 |
US8718554B2 US8718554B2 (en) | 2014-05-06 |
Family
ID=38369246
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/354,508 Expired - Fee Related US8718554B2 (en) | 2006-02-15 | 2006-02-15 | Means for provisioning and managing mobile device configuration over a near-field communication link |
Country Status (1)
Country | Link |
---|---|
US (1) | US8718554B2 (en) |
Cited By (137)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060015626A1 (en) * | 2004-07-01 | 2006-01-19 | Mika Hallamaa | Device management system |
US20080046583A1 (en) * | 2006-08-15 | 2008-02-21 | Bindu Rao | Device Management System For Mobile Devices That Supports Multiple-Point Transport |
US20080085740A1 (en) * | 2006-10-09 | 2008-04-10 | Hung Pil Lee | Method for displaying information in mobile communication terminal using bluetooth |
US20090106159A1 (en) * | 2007-10-22 | 2009-04-23 | Oberthur Technologies | Portable electronic device for exchanging values and method of using such a device |
WO2009069989A2 (en) * | 2007-11-30 | 2009-06-04 | Samsung Electronics Co., Ltd. | Method and appratus for sharing data in near field communication network |
EP2077652A2 (en) * | 2007-12-31 | 2009-07-08 | Intel Corporation | Service provisioning utilizing near field communication |
US20090264098A1 (en) * | 2008-04-17 | 2009-10-22 | Dell Products L.P. | System and Method for Configuring Devices for Wireless Communication |
EP2112634A1 (en) * | 2008-04-22 | 2009-10-28 | Nec Technologies (UK) Limited | Method for transferring provisioning information to a mobile unit |
US20090276547A1 (en) * | 2008-06-08 | 2009-11-05 | Apple Inc. | System and method for simplified data transfer |
US20100042954A1 (en) * | 2008-08-12 | 2010-02-18 | Apple Inc. | Motion based input selection |
WO2010030415A1 (en) * | 2008-09-15 | 2010-03-18 | Sony Ericsson Mobile Communications Ab | Wlan connection facilitated via near field communication |
US20100082444A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | Portable point of purchase user interfaces |
US20100082821A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | Device-to-device workflows |
US20100078472A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | Group peer-to-peer financial transactions |
US20100082481A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | Peer-to-peer financial transaction devices and methods |
US20100082455A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | Real-time bargain hunting |
US20100078471A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | System and method for processing peer-to-peer financial transactions |
US20100078475A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | System and method for transportation check-in |
US20100081375A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | System and method for simplified control of electronic devices |
US20100082491A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | System and method for providing electronic event tickets |
US20100082490A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | Systems and methods for secure wireless transactions |
US20100082489A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | System and method for processing media gifts |
US20100082447A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | On-the-go shopping list |
US20100082485A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | Portable point of purchase devices and methods |
US20100082784A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | System and method for simplified resource sharing |
US20100120406A1 (en) * | 2008-11-08 | 2010-05-13 | Phoenix Technologies Ltd. | Secure platform management with power savings capacity |
US20100125492A1 (en) * | 2008-11-14 | 2010-05-20 | Apple Inc. | System and method for providing contextual advertisements according to dynamic pricing scheme |
EP2211480A1 (en) * | 2009-01-26 | 2010-07-28 | Motorola, Inc. | Wireless communication device for providing at least one near field communication service |
US20100234050A1 (en) * | 2009-03-12 | 2010-09-16 | Allan Herrod | System and Method for Peer-To-Peer Staging of a Mobile Device |
US20100279734A1 (en) * | 2009-04-30 | 2010-11-04 | Nokia Corporation | Multiprotocol Antenna For Wireless Systems |
US20100277383A1 (en) * | 2009-04-30 | 2010-11-04 | Nokia Corporation | Multiprotocol antenna for wireles systems |
KR20110107475A (en) * | 2010-03-25 | 2011-10-04 | 삼성전자주식회사 | Intermediating apparatus and method for providing device management service |
US20110246780A1 (en) * | 2008-12-18 | 2011-10-06 | Tet Hin Yeap | Validation method and system for use in securing nomadic electronic transactions |
US8060073B1 (en) | 2009-02-09 | 2011-11-15 | Sprint Communications Company L.P. | System and method for provisioning a communication device based upon device capability |
US20120089737A1 (en) * | 2006-03-31 | 2012-04-12 | Research In Motion Limited | System and method for provisioning a remote resource for an electronic device |
EP2518982A1 (en) * | 2011-04-28 | 2012-10-31 | Nxp B.V. | Mobile device, transponder, near field communication system and method for configuring a mobile device |
US8468515B2 (en) | 2000-11-17 | 2013-06-18 | Hewlett-Packard Development Company, L.P. | Initialization and update of software and/or firmware in electronic devices |
US20130166399A1 (en) * | 2011-12-22 | 2013-06-27 | Broadcom Corporation | Method for transferring rich couponing and advertising content at the point of sale initiated by a single nfc tap |
US8479189B2 (en) | 2000-11-17 | 2013-07-02 | Hewlett-Packard Development Company, L.P. | Pattern detection preprocessor in an electronic device update generation system |
US20130185463A1 (en) * | 2010-02-12 | 2013-07-18 | Microsoft Corporation | Assignment of control of peripherals of a computing device |
US8526940B1 (en) | 2004-08-17 | 2013-09-03 | Palm, Inc. | Centralized rules repository for smart phone customer care |
US20130237148A1 (en) * | 2012-03-12 | 2013-09-12 | Research In Motion Limited | Wireless local area network hotspot registration using near field communications |
US20130257771A1 (en) * | 2012-03-30 | 2013-10-03 | Brother Kogyo Kabushiki Kaisha | Image processing device and image processing system |
US8555273B1 (en) | 2003-09-17 | 2013-10-08 | Palm. Inc. | Network for updating electronic devices |
US8578361B2 (en) | 2004-04-21 | 2013-11-05 | Palm, Inc. | Updating an electronic device with update agent code |
US20130303084A1 (en) * | 2012-05-11 | 2013-11-14 | Tyfone, Inc. | Application with device specific user interface |
US8610638B2 (en) | 2011-01-17 | 2013-12-17 | Nokia Corporation | FM transmission using a RFID/NFC coil antenna |
EP2663100A3 (en) * | 2012-05-12 | 2014-01-01 | Broadcom Corporation | Wi-Fi proximity considerations within single user, multiple user, multiple access, and/or MIMO wireless communications |
US20140038518A1 (en) * | 2012-08-03 | 2014-02-06 | Brother Kogyo Kabushiki Kaisha | Communication Device |
US20140038517A1 (en) * | 2012-08-03 | 2014-02-06 | Brother Kogyo Kabushiki Kaisha | Communication Device |
WO2014020044A3 (en) * | 2012-07-30 | 2014-05-30 | Nec Europe Ltd. | Method and system for configuring a user equipment |
KR20140069363A (en) * | 2011-10-19 | 2014-06-09 | 퀄컴 인코포레이티드 | Secure automatic configuration of equipment through replication |
US8752044B2 (en) | 2006-07-27 | 2014-06-10 | Qualcomm Incorporated | User experience and dependency management in a mobile device |
US20140191848A1 (en) * | 2013-01-07 | 2014-07-10 | Allure Energy, Inc. | Home automation using near field communication |
US20140215030A1 (en) * | 2013-01-30 | 2014-07-31 | Dell Products L.P. | Information Handling System Physical Component Inventory To Aid Operational Management Through Near Field Communication Device Interaction |
US8805434B2 (en) | 2010-11-23 | 2014-08-12 | Microsoft Corporation | Access techniques using a mobile communication device |
US20140252083A1 (en) * | 2011-01-04 | 2014-09-11 | AQ Corporation | System for providing advertisement information |
US20140274014A1 (en) * | 2013-03-14 | 2014-09-18 | T-Mobile Usa, Inc. | Enhanced device configuration |
WO2014158430A1 (en) * | 2013-03-14 | 2014-10-02 | Sprint Communications Company, L.P. | System for activating and customizing a mobile device via near field communication |
WO2014165230A1 (en) * | 2013-03-13 | 2014-10-09 | Lookout, Inc. | System and method for changing security behavior of a device based on proximity to another device |
US20140325594A1 (en) * | 2013-04-26 | 2014-10-30 | Broadcom Corporation | Methods and Systems for Secured Authentication of Applications on a Network |
US8893110B2 (en) | 2006-06-08 | 2014-11-18 | Qualcomm Incorporated | Device management in a network |
US8973091B2 (en) | 2011-10-03 | 2015-03-03 | Imprivata, Inc. | Secure authentication using mobile device |
DE202015100739U1 (en) | 2014-02-27 | 2015-03-05 | Fermax Design & Development, S.L.U. | System for configuring electronic systems |
US9042877B1 (en) | 2013-05-21 | 2015-05-26 | Sprint Communications Company L.P. | System and method for retrofitting a branding framework into a mobile communication device |
US9070149B2 (en) | 2008-09-30 | 2015-06-30 | Apple Inc. | Media gifting devices and methods |
US9100769B2 (en) | 2013-02-08 | 2015-08-04 | Sprint Communications Company L.P. | System and method of storing service brand packages on a mobile device |
US9098368B1 (en) | 2011-05-31 | 2015-08-04 | Sprint Communications Company L.P. | Loading branded media outside system partition |
US9100819B2 (en) | 2013-02-08 | 2015-08-04 | Sprint-Communications Company L.P. | System and method of provisioning and reprovisioning a mobile device based on self-locating |
US9125037B2 (en) | 2013-08-27 | 2015-09-01 | Sprint Communications Company L.P. | System and methods for deferred and remote device branding |
US9143924B1 (en) | 2013-08-27 | 2015-09-22 | Sprint Communications Company L.P. | Segmented customization payload delivery |
US9160813B2 (en) | 2009-03-10 | 2015-10-13 | Nxp, B.V. | Method and apparatus for transmitting an NFC application via a secure channel including a proxy and computing device |
US9161209B1 (en) | 2013-08-21 | 2015-10-13 | Sprint Communications Company L.P. | Multi-step mobile device initiation with intermediate partial reset |
US9161325B1 (en) | 2013-11-20 | 2015-10-13 | Sprint Communications Company L.P. | Subscriber identity module virtualization |
US9170870B1 (en) | 2013-08-27 | 2015-10-27 | Sprint Communications Company L.P. | Development and testing of payload receipt by a portable electronic device |
US9198027B2 (en) | 2012-09-18 | 2015-11-24 | Sprint Communications Company L.P. | Generic mobile devices customization framework |
US9204286B1 (en) | 2013-03-15 | 2015-12-01 | Sprint Communications Company L.P. | System and method of branding and labeling a mobile device |
US9204239B1 (en) | 2013-08-27 | 2015-12-01 | Sprint Communications Company L.P. | Segmented customization package within distributed server architecture |
US9208513B1 (en) | 2011-12-23 | 2015-12-08 | Sprint Communications Company L.P. | Automated branding of generic applications |
US9211065B2 (en) | 2011-10-19 | 2015-12-15 | Qualcomm Incorporated | Distributed control of medical devices to avoid effects of interference |
US9226133B1 (en) | 2013-01-18 | 2015-12-29 | Sprint Communications Company L.P. | Dynamic remotely managed SIM profile |
FR3025338A1 (en) * | 2014-09-02 | 2016-03-04 | Awox | DEVICES AND METHODS FOR TRANSFERRING ACCREDITATION INFORMATION AND ACCESSING A NETWORK |
US9280483B1 (en) | 2013-05-22 | 2016-03-08 | Sprint Communications Company L.P. | Rebranding a portable electronic device while maintaining user data |
US9301081B1 (en) | 2013-11-06 | 2016-03-29 | Sprint Communications Company L.P. | Delivery of oversized branding elements for customization |
US9307400B1 (en) | 2014-09-02 | 2016-04-05 | Sprint Communications Company L.P. | System and method of efficient mobile device network brand customization |
US9357378B1 (en) | 2015-03-04 | 2016-05-31 | Sprint Communications Company L.P. | Subscriber identity module (SIM) card initiation of custom application launcher installation on a mobile communication device |
US9363622B1 (en) | 2013-11-08 | 2016-06-07 | Sprint Communications Company L.P. | Separation of client identification composition from customization payload to original equipment manufacturer layer |
US9392395B1 (en) | 2014-01-16 | 2016-07-12 | Sprint Communications Company L.P. | Background delivery of device configuration and branding |
US9398462B1 (en) | 2015-03-04 | 2016-07-19 | Sprint Communications Company L.P. | Network access tiered based on application launcher installation |
US9420496B1 (en) | 2014-01-24 | 2016-08-16 | Sprint Communications Company L.P. | Activation sequence using permission based connection to network |
US9426641B1 (en) | 2014-06-05 | 2016-08-23 | Sprint Communications Company L.P. | Multiple carrier partition dynamic access on a mobile device |
US9451446B2 (en) | 2013-01-18 | 2016-09-20 | Sprint Communications Company L.P. | SIM profile brokering system |
US9485608B2 (en) | 2012-08-06 | 2016-11-01 | Brother Kogyo Kabushiki Kaisha | Communication device |
US9509686B2 (en) | 2010-12-03 | 2016-11-29 | Microsoft Technology Licensing, Llc | Secure element authentication |
US9525548B2 (en) | 2010-10-21 | 2016-12-20 | Microsoft Technology Licensing, Llc | Provisioning techniques |
US9532211B1 (en) | 2013-08-15 | 2016-12-27 | Sprint Communications Company L.P. | Directing server connection based on location identifier |
US9549009B1 (en) | 2013-02-08 | 2017-01-17 | Sprint Communications Company L.P. | Electronic fixed brand labeling |
WO2017010946A1 (en) * | 2015-07-16 | 2017-01-19 | Thinxtream Technologies Pte. Ltd. | System and method for contextual service delivery via mobile communication devices |
US9603009B1 (en) | 2014-01-24 | 2017-03-21 | Sprint Communications Company L.P. | System and method of branding a device independent of device activation |
US9609690B2 (en) | 2013-03-28 | 2017-03-28 | Brother Kogyo Kabushiki Kaisha | Communication device |
US9626363B2 (en) | 2008-06-08 | 2017-04-18 | Apple Inc. | System and method for placeshifting media playback |
US9681251B1 (en) | 2014-03-31 | 2017-06-13 | Sprint Communications Company L.P. | Customization for preloaded applications |
US9686138B2 (en) | 2013-01-30 | 2017-06-20 | Dell Products L.P. | Information handling system operational management through near field communication device interaction |
US9696956B2 (en) | 2012-07-03 | 2017-07-04 | Brother Kogyo Kabushiki Kaisha | Communication device communicating target data with external device according to near field communication |
US20170237472A1 (en) | 2012-03-30 | 2017-08-17 | Brother Kogyo Kabushiki Kaisha | Communication Device |
US9743271B2 (en) | 2013-10-23 | 2017-08-22 | Sprint Communications Company L.P. | Delivery of branding content and customizations to a mobile communication device |
US9763097B2 (en) | 2013-03-13 | 2017-09-12 | Lookout, Inc. | Method for performing device security corrective actions based on loss of proximity to another device |
US9781299B2 (en) | 2012-03-30 | 2017-10-03 | Brother Kogyo Kabushiki Kaisha | Function executing device with two types of wireless communication interfaces |
US20170374590A1 (en) * | 2013-03-27 | 2017-12-28 | Brother Kogyo Kabushiki Kaisha | Information processing apparatus, communication terminal, and non-transitory storage medium storing instructions executable by information processing apparatus |
US9913132B1 (en) | 2016-09-14 | 2018-03-06 | Sprint Communications Company L.P. | System and method of mobile phone customization based on universal manifest |
US9967759B2 (en) | 2013-01-30 | 2018-05-08 | Dell Products L.P. | Information handling system physical component maintenance through near field communication device interaction |
US9972159B2 (en) | 2013-10-10 | 2018-05-15 | Gilbarco Inc. | Fuel dispensing environment utilizing active sniffer to upgrade legacy equipment |
US9992326B1 (en) | 2014-10-31 | 2018-06-05 | Sprint Communications Company L.P. | Out of the box experience (OOBE) country choice using Wi-Fi layer transmission |
WO2018104167A1 (en) * | 2016-12-05 | 2018-06-14 | Continental Automotive Gmbh | Method for configuring devices, and corresponding devices |
US10021240B1 (en) | 2016-09-16 | 2018-07-10 | Sprint Communications Company L.P. | System and method of mobile phone customization based on universal manifest with feature override |
US10122581B2 (en) | 2007-09-28 | 2018-11-06 | Microsoft Technology Licensing, Llc | Device migration |
US10142014B2 (en) | 2013-09-30 | 2018-11-27 | Brother Kogyo Kabushiki Kaisha | Multi-function device and terminal device |
US10200440B2 (en) | 2016-04-14 | 2019-02-05 | Natural Gas Solutions North America, Llc | Reading and writing data to a meter that measures flow of material |
US10278045B2 (en) | 2014-05-30 | 2019-04-30 | Brother Kogyo Kabushiki Kaisha | Function execution device and communication terminal |
US10306433B1 (en) | 2017-05-01 | 2019-05-28 | Sprint Communications Company L.P. | Mobile phone differentiated user set-up |
US10332083B2 (en) | 2013-10-10 | 2019-06-25 | Gilbarco Inc. | System and method providing improved user experience in a fuel dispensing environment |
US10348368B2 (en) * | 2014-12-16 | 2019-07-09 | Blazer and Flip Flops, Inc. | Managing NFC devices based on downloaded data |
US10360364B2 (en) | 2013-03-13 | 2019-07-23 | Lookout, Inc. | Method for changing mobile communication device functionality based upon receipt of a second code |
US10362608B2 (en) * | 2016-04-13 | 2019-07-23 | Fortinet, Inc. | Managing wireless client connections via near field communication |
US10455071B2 (en) | 2012-05-09 | 2019-10-22 | Sprint Communications Company L.P. | Self-identification of brand and branded firmware installation in a generic electronic device |
US10455393B2 (en) | 2016-04-14 | 2019-10-22 | Natural Gas Solutions North America, Llc | Using wireless data transmission to maintain intrisnic safety of a gas meter |
US10506398B2 (en) | 2013-10-23 | 2019-12-10 | Sprint Communications Company Lp. | Implementation of remotely hosted branding content and customizations |
US10580011B1 (en) | 2014-12-17 | 2020-03-03 | Blazer and Flip Flops, Inc. | NFC-based options selection |
US10609185B2 (en) * | 2015-11-04 | 2020-03-31 | Rockwell Automation Technologies, Inc. | Method for topology tree to learn about, present, and configure device information by automatically uploading device description files from device |
US10679207B1 (en) | 2014-12-17 | 2020-06-09 | Blazer and Flip Flops, Inc. | Bill splitting and account delegation for NFC |
US11004058B2 (en) | 2014-12-17 | 2021-05-11 | Blazer and Flip Flops, Inc. | Transaction modification based on real-time offers |
US11017069B2 (en) | 2013-03-13 | 2021-05-25 | Lookout, Inc. | Method for changing mobile communications device functionality based upon receipt of a second code and the location of a key device |
US11062288B2 (en) | 2014-12-17 | 2021-07-13 | Blazer and Flip Flops, Inc. | Securing contactless payment |
US11062375B1 (en) | 2014-12-17 | 2021-07-13 | Blazer and Flip Flops, Inc. | Automatic shopping based on historical data |
US11258652B2 (en) | 2008-06-08 | 2022-02-22 | Apple Inc. | System and method for placeshifting media playback |
US11435888B1 (en) * | 2016-09-21 | 2022-09-06 | Apple Inc. | System with position-sensitive electronic device interface |
WO2022204413A1 (en) * | 2021-03-26 | 2022-09-29 | Capital One Services, Llc | A network-enabled smart apparatus and systems and methods for activating and provisioning same |
Families Citing this family (41)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011131745A1 (en) * | 2010-04-21 | 2011-10-27 | ETH Zürich | Authenticated key exchange using distance bounding protocol |
US9027102B2 (en) | 2012-05-11 | 2015-05-05 | Sprint Communications Company L.P. | Web server bypass of backend process on near field communications and secure element chips |
US9282898B2 (en) | 2012-06-25 | 2016-03-15 | Sprint Communications Company L.P. | End-to-end trusted communications infrastructure |
US8649770B1 (en) | 2012-07-02 | 2014-02-11 | Sprint Communications Company, L.P. | Extended trusted security zone radio modem |
US8667607B2 (en) | 2012-07-24 | 2014-03-04 | Sprint Communications Company L.P. | Trusted security zone access to peripheral devices |
US9183412B2 (en) | 2012-08-10 | 2015-11-10 | Sprint Communications Company L.P. | Systems and methods for provisioning and using multiple trusted security zones on an electronic device |
US9015068B1 (en) | 2012-08-25 | 2015-04-21 | Sprint Communications Company L.P. | Framework for real-time brokering of digital content delivery |
US9215180B1 (en) | 2012-08-25 | 2015-12-15 | Sprint Communications Company L.P. | File retrieval in real-time brokering of digital content |
US9578664B1 (en) | 2013-02-07 | 2017-02-21 | Sprint Communications Company L.P. | Trusted signaling in 3GPP interfaces in a network function virtualization wireless communication system |
US9161227B1 (en) | 2013-02-07 | 2015-10-13 | Sprint Communications Company L.P. | Trusted signaling in long term evolution (LTE) 4G wireless communication |
US9613208B1 (en) | 2013-03-13 | 2017-04-04 | Sprint Communications Company L.P. | Trusted security zone enhanced with trusted hardware drivers |
US9191388B1 (en) | 2013-03-15 | 2015-11-17 | Sprint Communications Company L.P. | Trusted security zone communication addressing on an electronic device |
US9374363B1 (en) | 2013-03-15 | 2016-06-21 | Sprint Communications Company L.P. | Restricting access of a portable communication device to confidential data or applications via a remote network based on event triggers generated by the portable communication device |
US9454723B1 (en) | 2013-04-04 | 2016-09-27 | Sprint Communications Company L.P. | Radio frequency identity (RFID) chip electrically and communicatively coupled to motherboard of mobile communication device |
US9171243B1 (en) * | 2013-04-04 | 2015-10-27 | Sprint Communications Company L.P. | System for managing a digest of biographical information stored in a radio frequency identity chip coupled to a mobile communication device |
US9324016B1 (en) | 2013-04-04 | 2016-04-26 | Sprint Communications Company L.P. | Digest of biographical information for an electronic device with static and dynamic portions |
US9838869B1 (en) | 2013-04-10 | 2017-12-05 | Sprint Communications Company L.P. | Delivering digital content to a mobile device via a digital rights clearing house |
US9443088B1 (en) | 2013-04-15 | 2016-09-13 | Sprint Communications Company L.P. | Protection for multimedia files pre-downloaded to a mobile device |
US9426604B1 (en) | 2013-04-30 | 2016-08-23 | Sprint Communications Company L.P. | Prevention of inductive coupling between components of a mobile communication device |
US9560519B1 (en) | 2013-06-06 | 2017-01-31 | Sprint Communications Company L.P. | Mobile communication device profound identity brokering framework |
US9183606B1 (en) | 2013-07-10 | 2015-11-10 | Sprint Communications Company L.P. | Trusted processing location within a graphics processing unit |
US9208339B1 (en) | 2013-08-12 | 2015-12-08 | Sprint Communications Company L.P. | Verifying Applications in Virtual Environments Using a Trusted Security Zone |
US9185626B1 (en) | 2013-10-29 | 2015-11-10 | Sprint Communications Company L.P. | Secure peer-to-peer call forking facilitated by trusted 3rd party voice server provisioning |
US9087318B1 (en) | 2013-11-08 | 2015-07-21 | Sprint Communications Company L.P. | Visually readable electronic label |
US9191522B1 (en) | 2013-11-08 | 2015-11-17 | Sprint Communications Company L.P. | Billing varied service based on tier |
US9118655B1 (en) | 2014-01-24 | 2015-08-25 | Sprint Communications Company L.P. | Trusted display and transmission of digital ticket documentation |
US9460573B1 (en) | 2014-02-27 | 2016-10-04 | Sprint Communications Company, L.P. | Autonomous authentication of a reader by a radio frequency identity (RFID) device |
US9226145B1 (en) | 2014-03-28 | 2015-12-29 | Sprint Communications Company L.P. | Verification of mobile device integrity during activation |
US9230085B1 (en) | 2014-07-29 | 2016-01-05 | Sprint Communications Company L.P. | Network based temporary trust extension to a remote or mobile device enabled via specialized cloud services |
US10819395B1 (en) | 2014-09-24 | 2020-10-27 | Amazon Technologies, Inc. | Inductance powered packaging to configure a device |
US9396424B1 (en) | 2014-11-04 | 2016-07-19 | Sprint Communications Company L.P. | Radio frequency induced power reception management for a radio frequency identity (RFID) chip embedded in a mobile communication device |
US9779232B1 (en) | 2015-01-14 | 2017-10-03 | Sprint Communications Company L.P. | Trusted code generation and verification to prevent fraud from maleficent external devices that capture data |
US9838868B1 (en) | 2015-01-26 | 2017-12-05 | Sprint Communications Company L.P. | Mated universal serial bus (USB) wireless dongles configured with destination addresses |
US9473945B1 (en) | 2015-04-07 | 2016-10-18 | Sprint Communications Company L.P. | Infrastructure for secure short message transmission |
US9591434B1 (en) | 2015-04-27 | 2017-03-07 | Sprint Communications Company L.P. | Virtual private network (VPN) tunneling in a user equipment (UE) brokered by a radio frequency identity (RFID) chip communicatively coupled to the user equipment |
US9819679B1 (en) | 2015-09-14 | 2017-11-14 | Sprint Communications Company L.P. | Hardware assisted provenance proof of named data networking associated to device data, addresses, services, and servers |
US10282719B1 (en) | 2015-11-12 | 2019-05-07 | Sprint Communications Company L.P. | Secure and trusted device-based billing and charging process using privilege for network proxy authentication and audit |
US9817992B1 (en) | 2015-11-20 | 2017-11-14 | Sprint Communications Company Lp. | System and method for secure USIM wireless network access |
US10033760B2 (en) * | 2016-05-27 | 2018-07-24 | Apple Inc. | Secure wireless ranging |
US10499249B1 (en) | 2017-07-11 | 2019-12-03 | Sprint Communications Company L.P. | Data link layer trust signaling in communication network |
US20230292093A1 (en) | 2020-05-04 | 2023-09-14 | Veratron Ag | Method for configuring converters for sensors and converter |
Citations (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030114104A1 (en) * | 2001-12-18 | 2003-06-19 | Roy Want | Method and system for identifying when a first device is within a physical range of a second device |
US20040063402A1 (en) * | 2002-09-26 | 2004-04-01 | Hitachi, Ltd. | Method and apparatus for mobile communication utilizing load balancing |
US20040185777A1 (en) * | 2003-02-28 | 2004-09-23 | Lucent Technologies Inc. | Portable wireless gateway |
US20040203590A1 (en) * | 2002-09-11 | 2004-10-14 | Koninklijke Philips Electronics N.V. | Set-up of wireless consumer electronics device using a learning remote control |
US20050064814A1 (en) * | 2003-07-22 | 2005-03-24 | Sony Corporation | Communication apparatus |
US7106175B2 (en) * | 1998-12-16 | 2006-09-12 | Symbol Technologies, Inc. | Wireless communication devices configurable via passive tags |
US20070136205A1 (en) * | 2003-10-22 | 2007-06-14 | Koninklijke Phillips Electronics N.C. | Digital rights management unit for a digital rights management system |
US20070145135A1 (en) * | 2005-12-28 | 2007-06-28 | Fabrice Jogand-Coulomb | Methods used in a nested memory system with near field communications capability |
US20070236350A1 (en) * | 2004-01-23 | 2007-10-11 | Sebastian Nystrom | Method, Device and System for Automated Context Information Based Selective Data Provision by Identification Means |
US7319843B2 (en) * | 2002-12-18 | 2008-01-15 | Koninkljke Philips Electronics N.V. | Storage unit comprising a main data carrier and a contactless chip |
US20080046985A1 (en) * | 2004-10-18 | 2008-02-21 | Koninklijke Philips Electronics, N.V. | Authorized domain management with enhanced flexibility |
US7349666B2 (en) * | 2003-01-17 | 2008-03-25 | Sony Ericsson Mobile Communications Japan, Inc. | Radio communication method and radio communication terminal |
US7366806B2 (en) * | 2004-07-27 | 2008-04-29 | Intel Corporation | Method and apparatus for RFID tag wherein memory of RFID tag is partitioned into two sections for reading using wireless interface and writing using bus |
US7386275B2 (en) * | 2005-03-11 | 2008-06-10 | Dell Products Llp | Systems and methods for managing out-of-band device connection |
US7412224B2 (en) * | 2005-11-14 | 2008-08-12 | Nokia Corporation | Portable local server with context sensing |
US20090144815A1 (en) * | 2004-11-01 | 2009-06-04 | Koninklijke Philips Electronics, N.V. | Access to domain |
US7643798B2 (en) * | 2005-12-09 | 2010-01-05 | Sony Ericsson Mobile Communications Ab | Passive NFC activation of short distance wireless communication |
US7697894B2 (en) * | 2005-03-01 | 2010-04-13 | Nokia Corporation | Method and system for tactile confirmation of service bookmarks |
US8068784B2 (en) * | 2004-06-28 | 2011-11-29 | Sony Corporation | Communication system and communication device |
-
2006
- 2006-02-15 US US11/354,508 patent/US8718554B2/en not_active Expired - Fee Related
Patent Citations (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7106175B2 (en) * | 1998-12-16 | 2006-09-12 | Symbol Technologies, Inc. | Wireless communication devices configurable via passive tags |
US20030114104A1 (en) * | 2001-12-18 | 2003-06-19 | Roy Want | Method and system for identifying when a first device is within a physical range of a second device |
US20040203590A1 (en) * | 2002-09-11 | 2004-10-14 | Koninklijke Philips Electronics N.V. | Set-up of wireless consumer electronics device using a learning remote control |
US20040063402A1 (en) * | 2002-09-26 | 2004-04-01 | Hitachi, Ltd. | Method and apparatus for mobile communication utilizing load balancing |
US7319843B2 (en) * | 2002-12-18 | 2008-01-15 | Koninkljke Philips Electronics N.V. | Storage unit comprising a main data carrier and a contactless chip |
US7349666B2 (en) * | 2003-01-17 | 2008-03-25 | Sony Ericsson Mobile Communications Japan, Inc. | Radio communication method and radio communication terminal |
US20040185777A1 (en) * | 2003-02-28 | 2004-09-23 | Lucent Technologies Inc. | Portable wireless gateway |
US20050064814A1 (en) * | 2003-07-22 | 2005-03-24 | Sony Corporation | Communication apparatus |
US20070136205A1 (en) * | 2003-10-22 | 2007-06-14 | Koninklijke Phillips Electronics N.C. | Digital rights management unit for a digital rights management system |
US20070236350A1 (en) * | 2004-01-23 | 2007-10-11 | Sebastian Nystrom | Method, Device and System for Automated Context Information Based Selective Data Provision by Identification Means |
US8068784B2 (en) * | 2004-06-28 | 2011-11-29 | Sony Corporation | Communication system and communication device |
US7366806B2 (en) * | 2004-07-27 | 2008-04-29 | Intel Corporation | Method and apparatus for RFID tag wherein memory of RFID tag is partitioned into two sections for reading using wireless interface and writing using bus |
US20080046985A1 (en) * | 2004-10-18 | 2008-02-21 | Koninklijke Philips Electronics, N.V. | Authorized domain management with enhanced flexibility |
US20090144815A1 (en) * | 2004-11-01 | 2009-06-04 | Koninklijke Philips Electronics, N.V. | Access to domain |
US7697894B2 (en) * | 2005-03-01 | 2010-04-13 | Nokia Corporation | Method and system for tactile confirmation of service bookmarks |
US7386275B2 (en) * | 2005-03-11 | 2008-06-10 | Dell Products Llp | Systems and methods for managing out-of-band device connection |
US7412224B2 (en) * | 2005-11-14 | 2008-08-12 | Nokia Corporation | Portable local server with context sensing |
US7643798B2 (en) * | 2005-12-09 | 2010-01-05 | Sony Ericsson Mobile Communications Ab | Passive NFC activation of short distance wireless communication |
US20070145135A1 (en) * | 2005-12-28 | 2007-06-28 | Fabrice Jogand-Coulomb | Methods used in a nested memory system with near field communications capability |
Cited By (263)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8468515B2 (en) | 2000-11-17 | 2013-06-18 | Hewlett-Packard Development Company, L.P. | Initialization and update of software and/or firmware in electronic devices |
US8479189B2 (en) | 2000-11-17 | 2013-07-02 | Hewlett-Packard Development Company, L.P. | Pattern detection preprocessor in an electronic device update generation system |
US8555273B1 (en) | 2003-09-17 | 2013-10-08 | Palm. Inc. | Network for updating electronic devices |
US8578361B2 (en) | 2004-04-21 | 2013-11-05 | Palm, Inc. | Updating an electronic device with update agent code |
US20060015626A1 (en) * | 2004-07-01 | 2006-01-19 | Mika Hallamaa | Device management system |
US8392545B2 (en) * | 2004-07-01 | 2013-03-05 | Nokia Corporation | Device management system |
US8526940B1 (en) | 2004-08-17 | 2013-09-03 | Palm, Inc. | Centralized rules repository for smart phone customer care |
US8335880B2 (en) * | 2006-03-31 | 2012-12-18 | Research In Motion Limited | System and method for provisioning a remote resource for an electronic device |
US20120089737A1 (en) * | 2006-03-31 | 2012-04-12 | Research In Motion Limited | System and method for provisioning a remote resource for an electronic device |
US9210221B2 (en) | 2006-03-31 | 2015-12-08 | Blackberry Limited | System and method for provisioning a remote resource for an electronic device |
US8893110B2 (en) | 2006-06-08 | 2014-11-18 | Qualcomm Incorporated | Device management in a network |
US9081638B2 (en) | 2006-07-27 | 2015-07-14 | Qualcomm Incorporated | User experience and dependency management in a mobile device |
US8752044B2 (en) | 2006-07-27 | 2014-06-10 | Qualcomm Incorporated | User experience and dependency management in a mobile device |
US8095634B2 (en) * | 2006-08-15 | 2012-01-10 | Hewlett-Packard Development Company, L.P. | Device management system for mobile devices that supports multiple-point transport |
US20080046583A1 (en) * | 2006-08-15 | 2008-02-21 | Bindu Rao | Device Management System For Mobile Devices That Supports Multiple-Point Transport |
US8270903B2 (en) * | 2006-10-09 | 2012-09-18 | Samsung Electronics Co., Ltd. | Method for displaying information in mobile communication terminal using bluetooth |
US20080085740A1 (en) * | 2006-10-09 | 2008-04-10 | Hung Pil Lee | Method for displaying information in mobile communication terminal using bluetooth |
US10122581B2 (en) | 2007-09-28 | 2018-11-06 | Microsoft Technology Licensing, Llc | Device migration |
US9792592B2 (en) * | 2007-10-22 | 2017-10-17 | Oberthur Technologies | Portable electronic device for exchanging values and method of using such a device |
US20090106159A1 (en) * | 2007-10-22 | 2009-04-23 | Oberthur Technologies | Portable electronic device for exchanging values and method of using such a device |
WO2009069989A3 (en) * | 2007-11-30 | 2009-09-03 | Samsung Electronics Co., Ltd. | Method and appratus for sharing data in near field communication network |
US8291091B2 (en) | 2007-11-30 | 2012-10-16 | Samsung Electronics Co., Ltd. | Method and apparatus for sharing data in near field communication network |
CN101953091A (en) * | 2007-11-30 | 2011-01-19 | 三星电子株式会社 | Method and appratus for sharing data in near field communication network |
WO2009069989A2 (en) * | 2007-11-30 | 2009-06-04 | Samsung Electronics Co., Ltd. | Method and appratus for sharing data in near field communication network |
EP3247086A1 (en) * | 2007-12-31 | 2017-11-22 | Intel Corporation | Service provisioning utilizing near field communication |
US8483610B2 (en) | 2007-12-31 | 2013-07-09 | Intel Corporation | Service provisioning utilizing near field communication |
EP2077652A2 (en) * | 2007-12-31 | 2009-07-08 | Intel Corporation | Service provisioning utilizing near field communication |
EP2077652A3 (en) * | 2007-12-31 | 2012-01-18 | Intel Corporation | Service provisioning utilizing near field communication |
US8543094B2 (en) | 2008-04-17 | 2013-09-24 | Dell Products L.P. | System and method for configuring devices for wireless communication |
US20090264098A1 (en) * | 2008-04-17 | 2009-10-22 | Dell Products L.P. | System and Method for Configuring Devices for Wireless Communication |
US7974606B2 (en) | 2008-04-17 | 2011-07-05 | Dell Products L.P. | System and method for configuring devices for wireless communication |
US20110223860A1 (en) * | 2008-04-17 | 2011-09-15 | Dell Products L.P. | System and Method for Configuring Devices for Wireless Communication |
EP2112634A1 (en) * | 2008-04-22 | 2009-10-28 | Nec Technologies (UK) Limited | Method for transferring provisioning information to a mobile unit |
US8401681B2 (en) | 2008-06-08 | 2013-03-19 | Apple Inc. | System and method for placeshifting media playback |
US11258652B2 (en) | 2008-06-08 | 2022-02-22 | Apple Inc. | System and method for placeshifting media playback |
US20090276547A1 (en) * | 2008-06-08 | 2009-11-05 | Apple Inc. | System and method for simplified data transfer |
US20100082136A1 (en) * | 2008-06-08 | 2010-04-01 | Apple Inc. | System and method for placeshifting media playback |
US9626363B2 (en) | 2008-06-08 | 2017-04-18 | Apple Inc. | System and method for placeshifting media playback |
US8458363B2 (en) | 2008-06-08 | 2013-06-04 | Apple Inc. | System and method for simplified data transfer |
US8516125B2 (en) | 2008-06-08 | 2013-08-20 | Apple Inc. | System and method for simplified data transfer |
US20090276439A1 (en) * | 2008-06-08 | 2009-11-05 | Apple Inc. | System and method for simplified data transfer |
US9130802B2 (en) | 2008-06-08 | 2015-09-08 | Apple Inc. | System and method for simplified data transfer |
US20100042954A1 (en) * | 2008-08-12 | 2010-02-18 | Apple Inc. | Motion based input selection |
US8116679B2 (en) * | 2008-09-15 | 2012-02-14 | Sony Ericsson Mobile Communications Ab | WLAN connection facilitated via near field communication |
KR101554058B1 (en) | 2008-09-15 | 2015-09-17 | 소니 모빌 커뮤니케이션즈 에이비 | Wlan connection facilitated via near field communication |
WO2010030415A1 (en) * | 2008-09-15 | 2010-03-18 | Sony Ericsson Mobile Communications Ab | Wlan connection facilitated via near field communication |
US20100068997A1 (en) * | 2008-09-15 | 2010-03-18 | Sony Ericsson Mobile Communications Ab | Wlan connection facilitated via near field communication |
US20100082481A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | Peer-to-peer financial transaction devices and methods |
US20100078471A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | System and method for processing peer-to-peer financial transactions |
US10380573B2 (en) | 2008-09-30 | 2019-08-13 | Apple Inc. | Peer-to-peer financial transaction devices and methods |
US8060627B2 (en) | 2008-09-30 | 2011-11-15 | Apple Inc. | Device-to-device workflows |
US8215546B2 (en) | 2008-09-30 | 2012-07-10 | Apple Inc. | System and method for transportation check-in |
US8239276B2 (en) | 2008-09-30 | 2012-08-07 | Apple Inc. | On-the-go shopping list |
US8850052B2 (en) | 2008-09-30 | 2014-09-30 | Apple Inc. | System and method for simplified resource sharing |
US10296889B2 (en) | 2008-09-30 | 2019-05-21 | Apple Inc. | Group peer-to-peer financial transactions |
US20100082444A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | Portable point of purchase user interfaces |
US20100082821A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | Device-to-device workflows |
US9070149B2 (en) | 2008-09-30 | 2015-06-30 | Apple Inc. | Media gifting devices and methods |
US20100078472A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | Group peer-to-peer financial transactions |
US20100082455A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | Real-time bargain hunting |
US8131645B2 (en) | 2008-09-30 | 2012-03-06 | Apple Inc. | System and method for processing media gifts |
US20100082784A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | System and method for simplified resource sharing |
US20100082485A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | Portable point of purchase devices and methods |
US20100082447A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | On-the-go shopping list |
US20100082489A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | System and method for processing media gifts |
US20100082490A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | Systems and methods for secure wireless transactions |
US9037513B2 (en) | 2008-09-30 | 2015-05-19 | Apple Inc. | System and method for providing electronic event tickets |
US20100082491A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | System and method for providing electronic event tickets |
US20100081375A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | System and method for simplified control of electronic devices |
US9026462B2 (en) | 2008-09-30 | 2015-05-05 | Apple Inc. | Portable point of purchase user interfaces |
US20100078475A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | System and method for transportation check-in |
US20100120406A1 (en) * | 2008-11-08 | 2010-05-13 | Phoenix Technologies Ltd. | Secure platform management with power savings capacity |
US8346234B2 (en) * | 2008-11-08 | 2013-01-01 | Absolute Software Corporation | Secure platform management with power savings capacity |
US20100125492A1 (en) * | 2008-11-14 | 2010-05-20 | Apple Inc. | System and method for providing contextual advertisements according to dynamic pricing scheme |
US9930020B2 (en) * | 2008-12-18 | 2018-03-27 | Bce Inc. | Validation method and system for use in securing nomadic electronic transactions |
US20160110720A1 (en) * | 2008-12-18 | 2016-04-21 | Bce Inc. | Validation method and system for use in securing nomadic electronic transactions |
US9231928B2 (en) * | 2008-12-18 | 2016-01-05 | Bce Inc. | Validation method and system for use in securing nomadic electronic transactions |
US9635002B2 (en) * | 2008-12-18 | 2017-04-25 | Bce Inc. | Validation method and system for use in securing nomadic electronic transactions |
US20110246780A1 (en) * | 2008-12-18 | 2011-10-06 | Tet Hin Yeap | Validation method and system for use in securing nomadic electronic transactions |
US20170228729A1 (en) * | 2008-12-18 | 2017-08-10 | Bce Inc. | Validation method and system for use in securing nomadic electronic transactions |
EP2211480A1 (en) * | 2009-01-26 | 2010-07-28 | Motorola, Inc. | Wireless communication device for providing at least one near field communication service |
US20100190437A1 (en) * | 2009-01-26 | 2010-07-29 | Motorola, Inc. | Wireless Communication Device for Providing at Least One Near Field Communication Service |
US8060073B1 (en) | 2009-02-09 | 2011-11-15 | Sprint Communications Company L.P. | System and method for provisioning a communication device based upon device capability |
US9160813B2 (en) | 2009-03-10 | 2015-10-13 | Nxp, B.V. | Method and apparatus for transmitting an NFC application via a secure channel including a proxy and computing device |
US9584483B2 (en) | 2009-03-10 | 2017-02-28 | Nxp B.V. | Method and apparatus for transmitting an NFC application via a secure channel including a proxy and computing device |
US8169934B2 (en) | 2009-03-12 | 2012-05-01 | Symbol Technologies, Inc. | System and method for peer-to-peer staging of a mobile device |
US20100234050A1 (en) * | 2009-03-12 | 2010-09-16 | Allan Herrod | System and Method for Peer-To-Peer Staging of a Mobile Device |
WO2010104669A3 (en) * | 2009-03-12 | 2010-12-16 | Symbol Technologies, Inc. | System and method for peer-to-peer staging of a mobile device |
US20100279734A1 (en) * | 2009-04-30 | 2010-11-04 | Nokia Corporation | Multiprotocol Antenna For Wireless Systems |
US8344959B2 (en) * | 2009-04-30 | 2013-01-01 | Nokia Corporation | Multiprotocol antenna for wireless systems |
US20100277383A1 (en) * | 2009-04-30 | 2010-11-04 | Nokia Corporation | Multiprotocol antenna for wireles systems |
US9189091B2 (en) * | 2010-02-12 | 2015-11-17 | Microsoft Technology Licensing, Llc | Assignment of control of peripherals of a computing device |
US20130185463A1 (en) * | 2010-02-12 | 2013-07-18 | Microsoft Corporation | Assignment of control of peripherals of a computing device |
KR20110107475A (en) * | 2010-03-25 | 2011-10-04 | 삼성전자주식회사 | Intermediating apparatus and method for providing device management service |
WO2011118980A3 (en) * | 2010-03-25 | 2012-01-26 | Samsung Electronics, Co., Ltd. | Relay device and method for providing device management service |
KR101632753B1 (en) | 2010-03-25 | 2016-06-22 | 삼성전자주식회사 | Intermediating apparatus and method for providing device management service |
US9288664B2 (en) | 2010-03-25 | 2016-03-15 | Samsung Electronics Co., Ltd. | Relay device and method for providing device management service |
US9525548B2 (en) | 2010-10-21 | 2016-12-20 | Microsoft Technology Licensing, Llc | Provisioning techniques |
US8805434B2 (en) | 2010-11-23 | 2014-08-12 | Microsoft Corporation | Access techniques using a mobile communication device |
US9026171B2 (en) | 2010-11-23 | 2015-05-05 | Microsoft Technology Licensing, Llc | Access techniques using a mobile communication device |
US9509686B2 (en) | 2010-12-03 | 2016-11-29 | Microsoft Technology Licensing, Llc | Secure element authentication |
US9785397B1 (en) | 2011-01-04 | 2017-10-10 | AQ Corporation | NFC-enabled digital apparatus and method of NFC-based information transmission |
US20190235825A1 (en) * | 2011-01-04 | 2019-08-01 | AQ Corporation | Nfc-enabled apparatus and method of operation thereof |
US20220091692A1 (en) * | 2011-01-04 | 2022-03-24 | Aqtech, Inc. | Nfc-enabled apparatus and method of operation thereof |
US10521180B1 (en) | 2011-01-04 | 2019-12-31 | AQ Corporation | NFC-enabled apparatus and method of operation thereof |
US10628116B2 (en) | 2011-01-04 | 2020-04-21 | AQ Corporation | NFC-enabled digital apparatus and method of operation thereof |
US20190236587A1 (en) * | 2011-01-04 | 2019-08-01 | AQ Corporation | Nfc-enabled apparatus and method of operation thereof |
US11269444B2 (en) * | 2011-01-04 | 2022-03-08 | Aqtech, Inc. | NFC-enabled apparatus and method of operation thereof |
US9477972B2 (en) * | 2011-01-04 | 2016-10-25 | AQ Corporation | System for providing advertisement information |
US20140252083A1 (en) * | 2011-01-04 | 2014-09-11 | AQ Corporation | System for providing advertisement information |
US20150127463A1 (en) * | 2011-01-04 | 2015-05-07 | AQ Corporation | System for providing advertisement information |
US9678704B2 (en) | 2011-01-04 | 2017-06-13 | AQ Corporation | NFC-enabled digital apparatus and method of NFC-based information transmission |
US8965785B2 (en) * | 2011-01-04 | 2015-02-24 | AQ Corporation | System for providing advertisement information |
US9129310B1 (en) * | 2011-01-04 | 2015-09-08 | AQ Corporation | NFC-enabled apparatus for providing contents |
US20150254722A1 (en) * | 2011-01-04 | 2015-09-10 | AQ Corporation | Nfc-enabled apparatus for providing contents |
US10635377B2 (en) * | 2011-01-04 | 2020-04-28 | AQ Corporation | NFC-enabled apparatus and method of operation thereof |
US9671995B2 (en) | 2011-01-04 | 2017-06-06 | AQ Corporation | NFC-enabled digital apparatus and method of NFC-based information transmission |
US10642565B2 (en) * | 2011-01-04 | 2020-05-05 | AQ Corporation | NFC-enabled apparatus and method of operation thereof |
US11194417B2 (en) * | 2011-01-04 | 2021-12-07 | Aqtech, Inc. | NFC-enabled apparatus and method of operation thereof |
US10261745B2 (en) * | 2011-01-04 | 2019-04-16 | AQ Corporation | NFC-enabled digital apparatus and method of NFC-based information transmission |
US8610638B2 (en) | 2011-01-17 | 2013-12-17 | Nokia Corporation | FM transmission using a RFID/NFC coil antenna |
EP2518982A1 (en) * | 2011-04-28 | 2012-10-31 | Nxp B.V. | Mobile device, transponder, near field communication system and method for configuring a mobile device |
US9098368B1 (en) | 2011-05-31 | 2015-08-04 | Sprint Communications Company L.P. | Loading branded media outside system partition |
US8973091B2 (en) | 2011-10-03 | 2015-03-03 | Imprivata, Inc. | Secure authentication using mobile device |
KR101712713B1 (en) | 2011-10-19 | 2017-03-06 | 퀄컴 인코포레이티드 | Secure automatic configuration of equipment through replication |
EP2769298A1 (en) * | 2011-10-19 | 2014-08-27 | Qualcomm Incorporated | Secure automatic configuration of equipment through replication |
US9211065B2 (en) | 2011-10-19 | 2015-12-15 | Qualcomm Incorporated | Distributed control of medical devices to avoid effects of interference |
KR20140069363A (en) * | 2011-10-19 | 2014-06-09 | 퀄컴 인코포레이티드 | Secure automatic configuration of equipment through replication |
JP2015502589A (en) * | 2011-10-19 | 2015-01-22 | クアルコム,インコーポレイテッド | Safe automatic configuration of equipment by duplication |
EP2769298B1 (en) * | 2011-10-19 | 2017-12-13 | Qualcomm Incorporated | Secure automatic configuration of equipment through replication |
CN103890725A (en) * | 2011-10-19 | 2014-06-25 | 高通股份有限公司 | Secure automatic configuration of equipment through replication |
US20130166399A1 (en) * | 2011-12-22 | 2013-06-27 | Broadcom Corporation | Method for transferring rich couponing and advertising content at the point of sale initiated by a single nfc tap |
US9208513B1 (en) | 2011-12-23 | 2015-12-08 | Sprint Communications Company L.P. | Automated branding of generic applications |
US9253589B2 (en) * | 2012-03-12 | 2016-02-02 | Blackberry Limited | Wireless local area network hotspot registration using near field communications |
US20130237148A1 (en) * | 2012-03-12 | 2013-09-12 | Research In Motion Limited | Wireless local area network hotspot registration using near field communications |
US10034260B2 (en) | 2012-03-12 | 2018-07-24 | Blackberry Limited | Wireless local area network hotspot registration using near field communications |
US11129123B2 (en) | 2012-03-12 | 2021-09-21 | Blackberry Limited | Wireless local area network hotspot registration using near field communications |
US20130257771A1 (en) * | 2012-03-30 | 2013-10-03 | Brother Kogyo Kabushiki Kaisha | Image processing device and image processing system |
US10879960B2 (en) | 2012-03-30 | 2020-12-29 | Brother Kogyo Kabushiki Kaisha | Communication device |
US10282153B2 (en) | 2012-03-30 | 2019-05-07 | Brother Kogyo Kabushiki Kaisha | Function executing device with two types of wireless communication interfaces |
US10333587B2 (en) | 2012-03-30 | 2019-06-25 | Brother Kogyo Kabushiki Kaisha | Communication device |
US11381280B2 (en) | 2012-03-30 | 2022-07-05 | Brother Kogyo Kabushiki Kaisha | Communication device |
US9781299B2 (en) | 2012-03-30 | 2017-10-03 | Brother Kogyo Kabushiki Kaisha | Function executing device with two types of wireless communication interfaces |
US10831427B2 (en) | 2012-03-30 | 2020-11-10 | Brother Kogyo Kabushiki Kaisha | Function executing device with two types of wireless communication interfaces |
US20170237472A1 (en) | 2012-03-30 | 2017-08-17 | Brother Kogyo Kabushiki Kaisha | Communication Device |
US11733950B2 (en) | 2012-03-30 | 2023-08-22 | Brother Kogyo Kabushiki Kaisha | Function executing device with two types of wireless communication interfaces |
US9858022B2 (en) | 2012-03-30 | 2018-01-02 | Brother Kogyo Kabushiki Kaisha | Function executing device with two types of wireless communication interfaces |
US9787363B2 (en) | 2012-03-30 | 2017-10-10 | Brother Kogyo Kabushiki Kaisha | Communication device |
US11435969B2 (en) | 2012-03-30 | 2022-09-06 | Brother Kogyo Kabushiki Kaisha | Function executing device with two types of wireless communication interfaces |
US9552086B2 (en) * | 2012-03-30 | 2017-01-24 | Brother Kogyo Kabushiki Kaisha | Image processing device and image processing system |
US10455071B2 (en) | 2012-05-09 | 2019-10-22 | Sprint Communications Company L.P. | Self-identification of brand and branded firmware installation in a generic electronic device |
US20130303084A1 (en) * | 2012-05-11 | 2013-11-14 | Tyfone, Inc. | Application with device specific user interface |
KR101419418B1 (en) * | 2012-05-12 | 2014-07-14 | 브로드콤 코포레이션 | Wi-fi proximity considerations within single user, multiple user, multiple access, and/or mimo wireless communications |
EP2663100A3 (en) * | 2012-05-12 | 2014-01-01 | Broadcom Corporation | Wi-Fi proximity considerations within single user, multiple user, multiple access, and/or MIMO wireless communications |
US10108383B2 (en) | 2012-07-03 | 2018-10-23 | Brother Kogyo Kabushiki Kaisha | Communication device communicating target data with external device according to near field communication |
US9696956B2 (en) | 2012-07-03 | 2017-07-04 | Brother Kogyo Kabushiki Kaisha | Communication device communicating target data with external device according to near field communication |
US20150195131A1 (en) * | 2012-07-30 | 2015-07-09 | Nec Europe Ltd. | Method and system for configuring a user equipment |
EP3908029A1 (en) * | 2012-07-30 | 2021-11-10 | NEC Corporation | Apparatus and method for selectively providing network access information |
US10841151B2 (en) * | 2012-07-30 | 2020-11-17 | Nec Corporation | Method and system for configuring a user equipment |
US11451438B2 (en) | 2012-07-30 | 2022-09-20 | Nec Corporation | Method and system for configuring a user equipment |
WO2014020044A3 (en) * | 2012-07-30 | 2014-05-30 | Nec Europe Ltd. | Method and system for configuring a user equipment |
US9661667B2 (en) * | 2012-08-03 | 2017-05-23 | Brother Kogyo Kabushiki Kaisha | Communication device |
US9698875B2 (en) | 2012-08-03 | 2017-07-04 | Brother Kogyo Kabushiki Kaisha | Communication device |
US9887742B2 (en) | 2012-08-03 | 2018-02-06 | Brother Kogyo Kabushiki Kaisha | Communication device |
US9596007B2 (en) * | 2012-08-03 | 2017-03-14 | Brother Kogyo Kabushiki Kaisha | Communication device |
US20140038518A1 (en) * | 2012-08-03 | 2014-02-06 | Brother Kogyo Kabushiki Kaisha | Communication Device |
US20140038517A1 (en) * | 2012-08-03 | 2014-02-06 | Brother Kogyo Kabushiki Kaisha | Communication Device |
US10389408B2 (en) | 2012-08-06 | 2019-08-20 | Brother Kogyo Kabushiki Kaisha | Communication device |
US9866992B2 (en) | 2012-08-06 | 2018-01-09 | Brother Kogyo Kabushiki Kaisha | Communication device |
US9485608B2 (en) | 2012-08-06 | 2016-11-01 | Brother Kogyo Kabushiki Kaisha | Communication device |
US9420399B2 (en) | 2012-09-18 | 2016-08-16 | Sprint Communications Company L.P. | Generic mobile devices customization framework |
US9198027B2 (en) | 2012-09-18 | 2015-11-24 | Sprint Communications Company L.P. | Generic mobile devices customization framework |
US20140191848A1 (en) * | 2013-01-07 | 2014-07-10 | Allure Energy, Inc. | Home automation using near field communication |
US9716530B2 (en) * | 2013-01-07 | 2017-07-25 | Samsung Electronics Co., Ltd. | Home automation using near field communication |
US9451446B2 (en) | 2013-01-18 | 2016-09-20 | Sprint Communications Company L.P. | SIM profile brokering system |
US9226133B1 (en) | 2013-01-18 | 2015-12-29 | Sprint Communications Company L.P. | Dynamic remotely managed SIM profile |
US9569294B2 (en) * | 2013-01-30 | 2017-02-14 | Dell Products L.P. | Information handling system physical component inventory to aid operational management through near field communication device interaction |
US11336522B2 (en) * | 2013-01-30 | 2022-05-17 | Dell Products L.P. | Information handling system physical component inventory to aid operational management through near field communication device interaction |
US20170118076A1 (en) * | 2013-01-30 | 2017-04-27 | Dell Products L.P. | Information Handling System Physical Component Inventory To Aid Operational Management Through Near Field Communication Device Interaction |
US9686138B2 (en) | 2013-01-30 | 2017-06-20 | Dell Products L.P. | Information handling system operational management through near field communication device interaction |
US20140215030A1 (en) * | 2013-01-30 | 2014-07-31 | Dell Products L.P. | Information Handling System Physical Component Inventory To Aid Operational Management Through Near Field Communication Device Interaction |
US9967759B2 (en) | 2013-01-30 | 2018-05-08 | Dell Products L.P. | Information handling system physical component maintenance through near field communication device interaction |
US9100819B2 (en) | 2013-02-08 | 2015-08-04 | Sprint-Communications Company L.P. | System and method of provisioning and reprovisioning a mobile device based on self-locating |
US9549009B1 (en) | 2013-02-08 | 2017-01-17 | Sprint Communications Company L.P. | Electronic fixed brand labeling |
US9100769B2 (en) | 2013-02-08 | 2015-08-04 | Sprint Communications Company L.P. | System and method of storing service brand packages on a mobile device |
US9432361B2 (en) | 2013-03-13 | 2016-08-30 | Lookout, Inc. | System and method for changing security behavior of a device based on proximity to another device |
WO2014165230A1 (en) * | 2013-03-13 | 2014-10-09 | Lookout, Inc. | System and method for changing security behavior of a device based on proximity to another device |
US9763097B2 (en) | 2013-03-13 | 2017-09-12 | Lookout, Inc. | Method for performing device security corrective actions based on loss of proximity to another device |
US11017069B2 (en) | 2013-03-13 | 2021-05-25 | Lookout, Inc. | Method for changing mobile communications device functionality based upon receipt of a second code and the location of a key device |
US10360364B2 (en) | 2013-03-13 | 2019-07-23 | Lookout, Inc. | Method for changing mobile communication device functionality based upon receipt of a second code |
WO2014158430A1 (en) * | 2013-03-14 | 2014-10-02 | Sprint Communications Company, L.P. | System for activating and customizing a mobile device via near field communication |
US9026105B2 (en) | 2013-03-14 | 2015-05-05 | Sprint Communications Company L.P. | System for activating and customizing a mobile device via near field communication |
US20140274014A1 (en) * | 2013-03-14 | 2014-09-18 | T-Mobile Usa, Inc. | Enhanced device configuration |
US9331747B2 (en) * | 2013-03-14 | 2016-05-03 | T-Mobile Usa, Inc. | Enhanced device configuration |
US9204286B1 (en) | 2013-03-15 | 2015-12-01 | Sprint Communications Company L.P. | System and method of branding and labeling a mobile device |
US10631216B2 (en) * | 2013-03-27 | 2020-04-21 | Brother Kogyo Kabushiki Kaisha | Information processing apparatus, communication terminal, and non-transitory storage medium storing instructions executable by information processing apparatus |
US11405837B2 (en) | 2013-03-27 | 2022-08-02 | Brother Kogyo Kabushiki Kaisha | Information processing apparatus, communication terminal, and non-transitory storage medium storing instructions executable by information processing apparatus |
US11917479B2 (en) | 2013-03-27 | 2024-02-27 | Brother Kogyo Kabushiki Kaisha | Information processing apparatus, communication terminal, and non-transitory storage medium storing instructions executable by information processing apparatus |
US20170374590A1 (en) * | 2013-03-27 | 2017-12-28 | Brother Kogyo Kabushiki Kaisha | Information processing apparatus, communication terminal, and non-transitory storage medium storing instructions executable by information processing apparatus |
US9609690B2 (en) | 2013-03-28 | 2017-03-28 | Brother Kogyo Kabushiki Kaisha | Communication device |
US10079836B2 (en) | 2013-04-26 | 2018-09-18 | Avago Technologies General Ip (Singapore) Pte. Ltd. | Methods and systems for secured authentication of applications on a network |
US9282086B2 (en) * | 2013-04-26 | 2016-03-08 | Broadcom Corporation | Methods and systems for secured authentication of applications on a network |
US20140325594A1 (en) * | 2013-04-26 | 2014-10-30 | Broadcom Corporation | Methods and Systems for Secured Authentication of Applications on a Network |
US9042877B1 (en) | 2013-05-21 | 2015-05-26 | Sprint Communications Company L.P. | System and method for retrofitting a branding framework into a mobile communication device |
US9280483B1 (en) | 2013-05-22 | 2016-03-08 | Sprint Communications Company L.P. | Rebranding a portable electronic device while maintaining user data |
US9532211B1 (en) | 2013-08-15 | 2016-12-27 | Sprint Communications Company L.P. | Directing server connection based on location identifier |
US9439025B1 (en) | 2013-08-21 | 2016-09-06 | Sprint Communications Company L.P. | Multi-step mobile device initiation with intermediate partial reset |
US9161209B1 (en) | 2013-08-21 | 2015-10-13 | Sprint Communications Company L.P. | Multi-step mobile device initiation with intermediate partial reset |
US9204239B1 (en) | 2013-08-27 | 2015-12-01 | Sprint Communications Company L.P. | Segmented customization package within distributed server architecture |
US9170870B1 (en) | 2013-08-27 | 2015-10-27 | Sprint Communications Company L.P. | Development and testing of payload receipt by a portable electronic device |
US9125037B2 (en) | 2013-08-27 | 2015-09-01 | Sprint Communications Company L.P. | System and methods for deferred and remote device branding |
US9143924B1 (en) | 2013-08-27 | 2015-09-22 | Sprint Communications Company L.P. | Segmented customization payload delivery |
US10581516B2 (en) | 2013-09-30 | 2020-03-03 | Brother Kogyo Kabushiki Kaisha | Communication device and terminal device |
US10142014B2 (en) | 2013-09-30 | 2018-11-27 | Brother Kogyo Kabushiki Kaisha | Multi-function device and terminal device |
US11012149B2 (en) | 2013-09-30 | 2021-05-18 | Brother Kogyo Kabushiki Kaisha | Communication device and terminal device |
US10332083B2 (en) | 2013-10-10 | 2019-06-25 | Gilbarco Inc. | System and method providing improved user experience in a fuel dispensing environment |
US9972159B2 (en) | 2013-10-10 | 2018-05-15 | Gilbarco Inc. | Fuel dispensing environment utilizing active sniffer to upgrade legacy equipment |
US9743271B2 (en) | 2013-10-23 | 2017-08-22 | Sprint Communications Company L.P. | Delivery of branding content and customizations to a mobile communication device |
US10382920B2 (en) | 2013-10-23 | 2019-08-13 | Sprint Communications Company L.P. | Delivery of branding content and customizations to a mobile communication device |
US10506398B2 (en) | 2013-10-23 | 2019-12-10 | Sprint Communications Company Lp. | Implementation of remotely hosted branding content and customizations |
US9301081B1 (en) | 2013-11-06 | 2016-03-29 | Sprint Communications Company L.P. | Delivery of oversized branding elements for customization |
US9363622B1 (en) | 2013-11-08 | 2016-06-07 | Sprint Communications Company L.P. | Separation of client identification composition from customization payload to original equipment manufacturer layer |
US9161325B1 (en) | 2013-11-20 | 2015-10-13 | Sprint Communications Company L.P. | Subscriber identity module virtualization |
US9392395B1 (en) | 2014-01-16 | 2016-07-12 | Sprint Communications Company L.P. | Background delivery of device configuration and branding |
US9420496B1 (en) | 2014-01-24 | 2016-08-16 | Sprint Communications Company L.P. | Activation sequence using permission based connection to network |
US9603009B1 (en) | 2014-01-24 | 2017-03-21 | Sprint Communications Company L.P. | System and method of branding a device independent of device activation |
DE202015100739U1 (en) | 2014-02-27 | 2015-03-05 | Fermax Design & Development, S.L.U. | System for configuring electronic systems |
US9681251B1 (en) | 2014-03-31 | 2017-06-13 | Sprint Communications Company L.P. | Customization for preloaded applications |
US11140535B2 (en) | 2014-05-30 | 2021-10-05 | Brother Kogyo Kabushiki Kaisha | Function execution device and communication terminal |
US11671813B2 (en) | 2014-05-30 | 2023-06-06 | Brother Kogyo Kabushiki Kaisha | Function execution device and communication terminal |
US11641573B2 (en) | 2014-05-30 | 2023-05-02 | Brother Kogyo Kabushiki Kaisha | Function execution device and communication terminal |
US10542403B2 (en) | 2014-05-30 | 2020-01-21 | Brother Kogyo Kabushiki Kaisha | Function execution device and communication terminal |
US10278045B2 (en) | 2014-05-30 | 2019-04-30 | Brother Kogyo Kabushiki Kaisha | Function execution device and communication terminal |
US9426641B1 (en) | 2014-06-05 | 2016-08-23 | Sprint Communications Company L.P. | Multiple carrier partition dynamic access on a mobile device |
WO2016034573A1 (en) * | 2014-09-02 | 2016-03-10 | Awox | Devices and methods for the transfer of information relating to accreditation and access to a network |
US9307400B1 (en) | 2014-09-02 | 2016-04-05 | Sprint Communications Company L.P. | System and method of efficient mobile device network brand customization |
FR3025338A1 (en) * | 2014-09-02 | 2016-03-04 | Awox | DEVICES AND METHODS FOR TRANSFERRING ACCREDITATION INFORMATION AND ACCESSING A NETWORK |
US9992326B1 (en) | 2014-10-31 | 2018-06-05 | Sprint Communications Company L.P. | Out of the box experience (OOBE) country choice using Wi-Fi layer transmission |
US10348368B2 (en) * | 2014-12-16 | 2019-07-09 | Blazer and Flip Flops, Inc. | Managing NFC devices based on downloaded data |
US10944448B2 (en) | 2014-12-16 | 2021-03-09 | Blazer and Flip Flops, Inc. | Managing NFC devices based on downloaded data |
US10580011B1 (en) | 2014-12-17 | 2020-03-03 | Blazer and Flip Flops, Inc. | NFC-based options selection |
US11062288B2 (en) | 2014-12-17 | 2021-07-13 | Blazer and Flip Flops, Inc. | Securing contactless payment |
US11062375B1 (en) | 2014-12-17 | 2021-07-13 | Blazer and Flip Flops, Inc. | Automatic shopping based on historical data |
US10679207B1 (en) | 2014-12-17 | 2020-06-09 | Blazer and Flip Flops, Inc. | Bill splitting and account delegation for NFC |
US11004058B2 (en) | 2014-12-17 | 2021-05-11 | Blazer and Flip Flops, Inc. | Transaction modification based on real-time offers |
US9794727B1 (en) | 2015-03-04 | 2017-10-17 | Sprint Communications Company L.P. | Network access tiered based on application launcher installation |
US9357378B1 (en) | 2015-03-04 | 2016-05-31 | Sprint Communications Company L.P. | Subscriber identity module (SIM) card initiation of custom application launcher installation on a mobile communication device |
US9398462B1 (en) | 2015-03-04 | 2016-07-19 | Sprint Communications Company L.P. | Network access tiered based on application launcher installation |
WO2017010946A1 (en) * | 2015-07-16 | 2017-01-19 | Thinxtream Technologies Pte. Ltd. | System and method for contextual service delivery via mobile communication devices |
US10834584B2 (en) | 2015-07-16 | 2020-11-10 | Thinxtream Technologies Pte. Ltd. | System and method for contextual service delivery via mobile communication devices |
US10609185B2 (en) * | 2015-11-04 | 2020-03-31 | Rockwell Automation Technologies, Inc. | Method for topology tree to learn about, present, and configure device information by automatically uploading device description files from device |
US10362608B2 (en) * | 2016-04-13 | 2019-07-23 | Fortinet, Inc. | Managing wireless client connections via near field communication |
US10455393B2 (en) | 2016-04-14 | 2019-10-22 | Natural Gas Solutions North America, Llc | Using wireless data transmission to maintain intrisnic safety of a gas meter |
US11115794B2 (en) | 2016-04-14 | 2021-09-07 | Natural Gas Solutions North America, Llc | Using wireless data transmission to maintain intrinsic safety of a gas meter |
US10200440B2 (en) | 2016-04-14 | 2019-02-05 | Natural Gas Solutions North America, Llc | Reading and writing data to a meter that measures flow of material |
US9913132B1 (en) | 2016-09-14 | 2018-03-06 | Sprint Communications Company L.P. | System and method of mobile phone customization based on universal manifest |
US10021240B1 (en) | 2016-09-16 | 2018-07-10 | Sprint Communications Company L.P. | System and method of mobile phone customization based on universal manifest with feature override |
US11435888B1 (en) * | 2016-09-21 | 2022-09-06 | Apple Inc. | System with position-sensitive electronic device interface |
WO2018104167A1 (en) * | 2016-12-05 | 2018-06-14 | Continental Automotive Gmbh | Method for configuring devices, and corresponding devices |
US10306433B1 (en) | 2017-05-01 | 2019-05-28 | Sprint Communications Company L.P. | Mobile phone differentiated user set-up |
US10805780B1 (en) | 2017-05-01 | 2020-10-13 | Sprint Communications Company L.P. | Mobile phone differentiated user set-up |
WO2022204413A1 (en) * | 2021-03-26 | 2022-09-29 | Capital One Services, Llc | A network-enabled smart apparatus and systems and methods for activating and provisioning same |
US11848724B2 (en) | 2021-03-26 | 2023-12-19 | Capital One Services, Llc | Network-enabled smart apparatus and systems and methods for activating and provisioning same |
Also Published As
Publication number | Publication date |
---|---|
US8718554B2 (en) | 2014-05-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8718554B2 (en) | Means for provisioning and managing mobile device configuration over a near-field communication link | |
US10893401B2 (en) | Method and system for communication in near field communication network | |
US11399398B2 (en) | Method and apparatus for Wi-Fi connection using Wi-Fi protected setup in portable terminal | |
US8543094B2 (en) | System and method for configuring devices for wireless communication | |
US8526885B2 (en) | Peer-to-peer host station | |
US8666313B2 (en) | Pairing devices using data exchanged in an out-of-band channel | |
JP5985767B2 (en) | Method and apparatus for peer-to-peer Wi-Fi ranging using near-field communication | |
RU2563458C2 (en) | Method and apparatus for improving nfc parameter update mechanisms | |
US20090282130A1 (en) | Resource sharing via close-proximity wireless communication | |
US11553349B2 (en) | Communication apparatus, control method, and computer-readable storage medium | |
US20140302794A1 (en) | Close proximity based event triggering | |
WO2006135872A2 (en) | Establishing wireless universal serial bus (wusb) connection via a trusted medium | |
KR20140054367A (en) | Methods and apparatus for improving management of nfc logical connections | |
US20130124630A1 (en) | Device and/or user identification | |
CN105191412A (en) | Delegating WIFI network discovery and traffic monitoring | |
CN105392133A (en) | Method and system for wireless function device to automatically access to wireless access point | |
US20080271131A1 (en) | Configuring devices in a secured network | |
US9860930B2 (en) | Method to set up a wireless communication connection and electronic device utilizing the same | |
US20080125107A1 (en) | Transparent enforcement of bluetooth encryption | |
Lotito et al. | OPEN-NPP: an open source library to enable P2P over NFC | |
EP2847874B1 (en) | Digital relay for out of network devices | |
RU2625321C2 (en) | Methods and device for peer-to-peer communications improvement, using the hot link mode | |
Lotito et al. | Open-snep project: Enabling p2p over nfc using npp and snep | |
KR101923824B1 (en) | Bluetooth communication method based on internet of things and apparatus therefore | |
Gupta et al. | Exploiting ZigBee and BLE |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MICROSOFT CORPORATION, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ABEL, MILLER T.;REEL/FRAME:017239/0106 Effective date: 20060214 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034543/0001 Effective date: 20141014 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551) Year of fee payment: 4 |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20220506 |